General

  • Target

    c49e231dbc89b50f9f4c40148d61bb6000d03455f38112f6bf02900fa2b47dbd

  • Size

    35KB

  • Sample

    240910-z1yg8swhmh

  • MD5

    59a5c322894532880f84b8019dcdd0cf

  • SHA1

    7fd471e6db362b84c47d9ce2501703e954dc5ff2

  • SHA256

    c49e231dbc89b50f9f4c40148d61bb6000d03455f38112f6bf02900fa2b47dbd

  • SHA512

    22eaca6b9486f8309b25fa8875f35d64a391e2eb3780c53d37097392a8720b78267571319e39720ffa39f27b39e129433b3f0703158dba35df7f8f5c1e7a998b

  • SSDEEP

    384:gyiSwvxjk+t0/8iRMsPJ1XM4CQn6DQl0jYktv5y6CEt:g1xw+tEDRMsR1X/5mQlrkny6C

Malware Config

Extracted

Family

metasploit

Version

metasploit_stager

C2

10.127.246.155:4444

Targets

    • Target

      c49e231dbc89b50f9f4c40148d61bb6000d03455f38112f6bf02900fa2b47dbd

    • Size

      35KB

    • MD5

      59a5c322894532880f84b8019dcdd0cf

    • SHA1

      7fd471e6db362b84c47d9ce2501703e954dc5ff2

    • SHA256

      c49e231dbc89b50f9f4c40148d61bb6000d03455f38112f6bf02900fa2b47dbd

    • SHA512

      22eaca6b9486f8309b25fa8875f35d64a391e2eb3780c53d37097392a8720b78267571319e39720ffa39f27b39e129433b3f0703158dba35df7f8f5c1e7a998b

    • SSDEEP

      384:gyiSwvxjk+t0/8iRMsPJ1XM4CQn6DQl0jYktv5y6CEt:g1xw+tEDRMsR1X/5mQlrkny6C

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Process spawned suspicious child process

      This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

MITRE ATT&CK Enterprise v15

Tasks