General

  • Target

    0b538dcb1df636169b8965f8bc062b37.exe

  • Size

    290KB

  • Sample

    240818-py3dastemh

  • MD5

    0b538dcb1df636169b8965f8bc062b37

  • SHA1

    e09dc4d56754cb65c77c17ee430c9b5fe95c480b

  • SHA256

    c84a036a464797e523f1df99672125dfe61f7222fa62c9e7739fce9ea498a081

  • SHA512

    ce5c653b61df71607296d7f9e2f008f8b63277b27c7e37f07952a66ec62271f8e9ed9ba9f2d661a6e59c2adc40272d54dc673fc05e1f25282cc131741e50db20

  • SSDEEP

    6144:R1o12lUr7EbaK1fw9mdxEDZJ/wDAUZlYm3UhM9l:RC1ZobTw9yEDZJwDrPYmO

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

193.117.208.148:7800

Targets

    • Target

      0b538dcb1df636169b8965f8bc062b37.exe

    • Size

      290KB

    • MD5

      0b538dcb1df636169b8965f8bc062b37

    • SHA1

      e09dc4d56754cb65c77c17ee430c9b5fe95c480b

    • SHA256

      c84a036a464797e523f1df99672125dfe61f7222fa62c9e7739fce9ea498a081

    • SHA512

      ce5c653b61df71607296d7f9e2f008f8b63277b27c7e37f07952a66ec62271f8e9ed9ba9f2d661a6e59c2adc40272d54dc673fc05e1f25282cc131741e50db20

    • SSDEEP

      6144:R1o12lUr7EbaK1fw9mdxEDZJ/wDAUZlYm3UhM9l:RC1ZobTw9yEDZJwDrPYmO

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks