General

  • Target

    928190cc5aef32ee7123dcf5aa81874ccc880e7362f30a1e6a7dfcb4dbc42500

  • Size

    8KB

  • Sample

    240705-apczqazeph

  • MD5

    4c79e77a88a9d5c89dd4774b429dc63b

  • SHA1

    ff57655a9545ce6f8dcb70d0c97429dd2bf73af7

  • SHA256

    928190cc5aef32ee7123dcf5aa81874ccc880e7362f30a1e6a7dfcb4dbc42500

  • SHA512

    3bcbad38931e3724b3e427c8b1f79b951d0353cbbad2209449b6715afe4906d0a349b5bb56d578e4755af840a09d133d9d46f0316121d02bd041df565026917d

  • SSDEEP

    48:id+P3zSSxPIux486DhFhklWqJ1ATd/JQv+Vf:QvSx335JOR/JQv+

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

95.107.32.173:80

Targets

    • Target

      928190cc5aef32ee7123dcf5aa81874ccc880e7362f30a1e6a7dfcb4dbc42500

    • Size

      8KB

    • MD5

      4c79e77a88a9d5c89dd4774b429dc63b

    • SHA1

      ff57655a9545ce6f8dcb70d0c97429dd2bf73af7

    • SHA256

      928190cc5aef32ee7123dcf5aa81874ccc880e7362f30a1e6a7dfcb4dbc42500

    • SHA512

      3bcbad38931e3724b3e427c8b1f79b951d0353cbbad2209449b6715afe4906d0a349b5bb56d578e4755af840a09d133d9d46f0316121d02bd041df565026917d

    • SSDEEP

      48:id+P3zSSxPIux486DhFhklWqJ1ATd/JQv+Vf:QvSx335JOR/JQv+

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Blocklisted process makes network request

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks