General

  • Target

    8cd0acf8f998bb8737c2c1b0c78b8e76d04a379330837c311c3a3d710d04ef80N

  • Size

    9KB

  • Sample

    240918-14m2cawanf

  • MD5

    146bb80776d8f19937b5023256c6e520

  • SHA1

    3c91d29a47330347004ce74d3b7dce9e9f9b491e

  • SHA256

    8cd0acf8f998bb8737c2c1b0c78b8e76d04a379330837c311c3a3d710d04ef80

  • SHA512

    4b2c06a9d9ee069b3db1e27c989ac9a8742c49e87bd5e2b87a4f65589c156c1f6d235adf6ada17343829bc9ee84bcb3a988ee2776b52d514072e073fce1f4527

  • SSDEEP

    48:q0r+l6O5aXyn/hNhx4/jC/VXq+tlqSD9C2VIb0E:dX0Zq+f95x

Malware Config

Extracted

Family

metasploit

Version

metasploit_stager

C2

192.168.168.129:4444

Targets

    • Target

      8cd0acf8f998bb8737c2c1b0c78b8e76d04a379330837c311c3a3d710d04ef80N

    • Size

      9KB

    • MD5

      146bb80776d8f19937b5023256c6e520

    • SHA1

      3c91d29a47330347004ce74d3b7dce9e9f9b491e

    • SHA256

      8cd0acf8f998bb8737c2c1b0c78b8e76d04a379330837c311c3a3d710d04ef80

    • SHA512

      4b2c06a9d9ee069b3db1e27c989ac9a8742c49e87bd5e2b87a4f65589c156c1f6d235adf6ada17343829bc9ee84bcb3a988ee2776b52d514072e073fce1f4527

    • SSDEEP

      48:q0r+l6O5aXyn/hNhx4/jC/VXq+tlqSD9C2VIb0E:dX0Zq+f95x

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks