General

  • Target

    4f567bf4bdba4da6f49fffc64b5dfe1ae5023cdf146f4bdcf08041fe3f8372f5N

  • Size

    72KB

  • Sample

    240916-zejf7aycqd

  • MD5

    ec89500d1b49a7d3f84799a4561254b0

  • SHA1

    4907a12c3a5408262c58c21787409ba21027ed05

  • SHA256

    4f567bf4bdba4da6f49fffc64b5dfe1ae5023cdf146f4bdcf08041fe3f8372f5

  • SHA512

    ff13c9a05824c1c15d948c6ba8369ca149b08d4f622e0a2164b370af781a3555b7fd2fec74662a280cc01956213113a14f5795b8c208c11b3e4bb4b2ea4271c0

  • SSDEEP

    1536:IP9oEmoQx/ZS0aCUpqGF62kFJZtMb+KR0Nc8QsJq39:+rQx/M0aCbpJ/e0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

86.248.236.214:21526

Targets

    • Target

      4f567bf4bdba4da6f49fffc64b5dfe1ae5023cdf146f4bdcf08041fe3f8372f5N

    • Size

      72KB

    • MD5

      ec89500d1b49a7d3f84799a4561254b0

    • SHA1

      4907a12c3a5408262c58c21787409ba21027ed05

    • SHA256

      4f567bf4bdba4da6f49fffc64b5dfe1ae5023cdf146f4bdcf08041fe3f8372f5

    • SHA512

      ff13c9a05824c1c15d948c6ba8369ca149b08d4f622e0a2164b370af781a3555b7fd2fec74662a280cc01956213113a14f5795b8c208c11b3e4bb4b2ea4271c0

    • SSDEEP

      1536:IP9oEmoQx/ZS0aCUpqGF62kFJZtMb+KR0Nc8QsJq39:+rQx/M0aCbpJ/e0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks