General

  • Target

    b977e32bb2bf57dd5e8a13a96e9776329ccb958e474f231e1857dd8c68190bd6

  • Size

    72KB

  • Sample

    240918-a8m9sstenb

  • MD5

    3520bcc005baaf6ef70751f178a7f056

  • SHA1

    299c044e8be29783cc4099c8604f17beb569c445

  • SHA256

    b977e32bb2bf57dd5e8a13a96e9776329ccb958e474f231e1857dd8c68190bd6

  • SHA512

    ccca51caf7a530210adf898cd4d6a9e629c6cd12382cd579c32ce253ef9abacb627ebb719187f7856a765c625413ed00edc861e15be71cf066df9027a7f72a78

  • SSDEEP

    1536:IovUWeaCnNHPxds2JakJr9nar0h0Mb+KR0Nc8QsJq39:pXea0/sUJMg0e0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

59.236.232.9:30528

Targets

    • Target

      b977e32bb2bf57dd5e8a13a96e9776329ccb958e474f231e1857dd8c68190bd6

    • Size

      72KB

    • MD5

      3520bcc005baaf6ef70751f178a7f056

    • SHA1

      299c044e8be29783cc4099c8604f17beb569c445

    • SHA256

      b977e32bb2bf57dd5e8a13a96e9776329ccb958e474f231e1857dd8c68190bd6

    • SHA512

      ccca51caf7a530210adf898cd4d6a9e629c6cd12382cd579c32ce253ef9abacb627ebb719187f7856a765c625413ed00edc861e15be71cf066df9027a7f72a78

    • SSDEEP

      1536:IovUWeaCnNHPxds2JakJr9nar0h0Mb+KR0Nc8QsJq39:pXea0/sUJMg0e0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.