General

  • Target

    3a1185d31745e128cdafa7de689c04c1df404e6a76ab93ee3706e7a05d746a8dN

  • Size

    72KB

  • Sample

    240921-t6thksscqf

  • MD5

    7ae49eb8ee5ea69b9ddcc543fd5fc730

  • SHA1

    2d17d1bd04a94bdb9a57879f96d246093ba673da

  • SHA256

    3a1185d31745e128cdafa7de689c04c1df404e6a76ab93ee3706e7a05d746a8d

  • SHA512

    20513583fb51712cb323ad3602bb2602746bbebeb11702877b7e77fa40e70935d1b2993f04c08d1411438de74241f57d8f7b1d6749f473c94bf99bfdddd13535

  • SSDEEP

    1536:IB70oObeaM3NU84h7FbvnYgMb+KR0Nc8QsJq39:+7x+uNItYge0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

10.10.1.13:444

Targets

    • Target

      3a1185d31745e128cdafa7de689c04c1df404e6a76ab93ee3706e7a05d746a8dN

    • Size

      72KB

    • MD5

      7ae49eb8ee5ea69b9ddcc543fd5fc730

    • SHA1

      2d17d1bd04a94bdb9a57879f96d246093ba673da

    • SHA256

      3a1185d31745e128cdafa7de689c04c1df404e6a76ab93ee3706e7a05d746a8d

    • SHA512

      20513583fb51712cb323ad3602bb2602746bbebeb11702877b7e77fa40e70935d1b2993f04c08d1411438de74241f57d8f7b1d6749f473c94bf99bfdddd13535

    • SSDEEP

      1536:IB70oObeaM3NU84h7FbvnYgMb+KR0Nc8QsJq39:+7x+uNItYge0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks