General

  • Target

    da3f4ff88c540c8647d8ba8881e42b0d.zip

  • Size

    11KB

  • Sample

    240902-2vakbs1arf

  • MD5

    e571488734461f0382dcca460e30782d

  • SHA1

    d6adc8a375c5c55425cd66805e5d4d0fa9d1e408

  • SHA256

    e3a2561e90769fe35e045c3153968f05010f1a94d5100702ade307a7b5ce5590

  • SHA512

    068eb721bed3331531a66179127927d8b359961f9dc5cd52de6d22924184c56129e99bff43d30d7c80381a99ea3205b0b637f512af78c43f1b4a4cd948b0087f

  • SSDEEP

    192:yJ7ZVe9UFKSPyszuXPxx4fcgaEYDDpAohg6JkMPQji0eGugxEzqe2ZGl7yEluXt7:yRZVKuyszuXPxxCaEODpA8g6XPMeGV6S

Malware Config

Extracted

Family

metasploit

Version

windows/shell_bind_tcp

Targets

    • Target

      ce756ff0429c66717f97f52d14ad7c48478c373c26a1187e486a6b8e13a95d9a

    • Size

      39KB

    • MD5

      da3f4ff88c540c8647d8ba8881e42b0d

    • SHA1

      0ba6f266641d322f8da83d9030307a4d87303bbc

    • SHA256

      ce756ff0429c66717f97f52d14ad7c48478c373c26a1187e486a6b8e13a95d9a

    • SHA512

      cc2bf841de29edae9edabeb22722d9e4bca69a75b0aad533c01ad33b28cdd5c8db4f6e3889b39c4d75cf38f1488065cf3d3ef029c02ceb329f06cc01304be707

    • SSDEEP

      384:qg6CU4H6c3WSpsYkmQMnkcgnDGXr3wPhkpp7v07MByD23YZehtI:qg654ac3HpvkmQ438CyhqpAIByDrYh

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks