General

  • Target

    9eb19fce74fad102e0bc12876974ad09c57a6051f8805066f48f8f95622e63d5

  • Size

    150KB

  • Sample

    240913-jwqntssepj

  • MD5

    5cd1c164ab99acdb90c9ef1bde8a2cba

  • SHA1

    cb7eb5fbc315213d848a64433e7ab47abacbf729

  • SHA256

    9eb19fce74fad102e0bc12876974ad09c57a6051f8805066f48f8f95622e63d5

  • SHA512

    71d8b255e1baf6144582aa72a8d1ca37af71c2fc2d746d71308e48a17da5e2af2be7353a997ca5266001dc8cfdc43db249dba717aed9de11357c42b593a05897

  • SSDEEP

    3072:BPZrCVQ2i6oz54js92mPm6zSQh3IVpVE9KFFGNmPRkn6Quo:ZZrCivpFz3wVE9K3GNQRkn6Q9

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.72.182:666

Targets

    • Target

      9eb19fce74fad102e0bc12876974ad09c57a6051f8805066f48f8f95622e63d5

    • Size

      150KB

    • MD5

      5cd1c164ab99acdb90c9ef1bde8a2cba

    • SHA1

      cb7eb5fbc315213d848a64433e7ab47abacbf729

    • SHA256

      9eb19fce74fad102e0bc12876974ad09c57a6051f8805066f48f8f95622e63d5

    • SHA512

      71d8b255e1baf6144582aa72a8d1ca37af71c2fc2d746d71308e48a17da5e2af2be7353a997ca5266001dc8cfdc43db249dba717aed9de11357c42b593a05897

    • SSDEEP

      3072:BPZrCVQ2i6oz54js92mPm6zSQh3IVpVE9KFFGNmPRkn6Quo:ZZrCivpFz3wVE9K3GNQRkn6Q9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks