General

  • Target

    4d77f00f7e725cce85333825fed5937b8bb05d1e1ca61c132f9415f35861d3ef

  • Size

    1.3MB

  • Sample

    240619-lhxakaxhjh

  • MD5

    39478d08d3039018e422f38e1d3a228a

  • SHA1

    dc3820e6e1de54459d44f8581b0d56e972f3f5ff

  • SHA256

    4d77f00f7e725cce85333825fed5937b8bb05d1e1ca61c132f9415f35861d3ef

  • SHA512

    b30f0d037402f360fa039a3df09c39fa50cbb6b4a54033a0fb69f492d87730872c8739a3324155e4947b717100e31d26fcee6eba4e94848a559aa208b3c3518e

  • SSDEEP

    24576:KJvKXUHgnhSC0badP0QiPYnSFELlFFx0A4cAhPSNfL1JD/tbOFmH:OKXUAsadP0QiPzEz0AVISNT1JtMy

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.1.111:4444

Targets

    • Target

      4d77f00f7e725cce85333825fed5937b8bb05d1e1ca61c132f9415f35861d3ef

    • Size

      1.3MB

    • MD5

      39478d08d3039018e422f38e1d3a228a

    • SHA1

      dc3820e6e1de54459d44f8581b0d56e972f3f5ff

    • SHA256

      4d77f00f7e725cce85333825fed5937b8bb05d1e1ca61c132f9415f35861d3ef

    • SHA512

      b30f0d037402f360fa039a3df09c39fa50cbb6b4a54033a0fb69f492d87730872c8739a3324155e4947b717100e31d26fcee6eba4e94848a559aa208b3c3518e

    • SSDEEP

      24576:KJvKXUHgnhSC0badP0QiPYnSFELlFFx0A4cAhPSNfL1JD/tbOFmH:OKXUAsadP0QiPzEz0AVISNT1JtMy

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks