General

  • Target

    d3ccdec2f2d49585d6474fd03de3bb71d60efd29d8ec6e15f361eb421cce03cdN

  • Size

    72KB

  • Sample

    240918-xn9cvsybqj

  • MD5

    d0ec90809604544ecb9199e05c042c80

  • SHA1

    937f0e7432d65338b7432bb8ee09ba1a162e4d2a

  • SHA256

    d3ccdec2f2d49585d6474fd03de3bb71d60efd29d8ec6e15f361eb421cce03cd

  • SHA512

    0f6621a5da96c598bfa6e4ef35332490f2fa881085e6be3cdd82255d1eccc5d196536d4f269d4995c57da95b07995c6183ac6cc6f2feae54ab715e152f733cfb

  • SSDEEP

    1536:I9JhqvsELJWl+L4iD6sahbuUs6uRA5UsMb+KR0Nc8QsJq39:o8WsL9jM5Kwe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.1.17:10001

Targets

    • Target

      d3ccdec2f2d49585d6474fd03de3bb71d60efd29d8ec6e15f361eb421cce03cdN

    • Size

      72KB

    • MD5

      d0ec90809604544ecb9199e05c042c80

    • SHA1

      937f0e7432d65338b7432bb8ee09ba1a162e4d2a

    • SHA256

      d3ccdec2f2d49585d6474fd03de3bb71d60efd29d8ec6e15f361eb421cce03cd

    • SHA512

      0f6621a5da96c598bfa6e4ef35332490f2fa881085e6be3cdd82255d1eccc5d196536d4f269d4995c57da95b07995c6183ac6cc6f2feae54ab715e152f733cfb

    • SSDEEP

      1536:I9JhqvsELJWl+L4iD6sahbuUs6uRA5UsMb+KR0Nc8QsJq39:o8WsL9jM5Kwe0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks