General

  • Target

    32e0aaa53ba46d5bf5b86f28ac2e04e9eb1e3f432a9d2983804bf20559bb8dfeN

  • Size

    72KB

  • Sample

    240918-ljef5stdlc

  • MD5

    f415e3ec25c0f0b9af4ed15c698d2890

  • SHA1

    36d0205cb7c4a1267ad52ce05f0948ca296a1f62

  • SHA256

    32e0aaa53ba46d5bf5b86f28ac2e04e9eb1e3f432a9d2983804bf20559bb8dfe

  • SHA512

    9e1bcc406ac86c95969ca984c41009f5af0c9cc4e6ddc7e090f6b3ffaed5bbef1de7c02982bcc188667916b03015fcc24c90cb22969990df249cc95a1920bcf0

  • SSDEEP

    1536:IvQfmUchsSn9HkhS/UaOj+zCMb+KR0Nc8QsJq39:gQfG79EU/jOjLe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

10.2.221.229:1337

Targets

    • Target

      32e0aaa53ba46d5bf5b86f28ac2e04e9eb1e3f432a9d2983804bf20559bb8dfeN

    • Size

      72KB

    • MD5

      f415e3ec25c0f0b9af4ed15c698d2890

    • SHA1

      36d0205cb7c4a1267ad52ce05f0948ca296a1f62

    • SHA256

      32e0aaa53ba46d5bf5b86f28ac2e04e9eb1e3f432a9d2983804bf20559bb8dfe

    • SHA512

      9e1bcc406ac86c95969ca984c41009f5af0c9cc4e6ddc7e090f6b3ffaed5bbef1de7c02982bcc188667916b03015fcc24c90cb22969990df249cc95a1920bcf0

    • SSDEEP

      1536:IvQfmUchsSn9HkhS/UaOj+zCMb+KR0Nc8QsJq39:gQfG79EU/jOjLe0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks