General

  • Target

    4f7a10e508c29908c67c4b3741463db437e64dc943bf845a92000d704625e83cN.exe

  • Size

    72KB

  • Sample

    240925-k8d18szglc

  • MD5

    f21a365325301db80dddb6185cdabcc0

  • SHA1

    c74f7c0a764ea51efb1994c41ca01fea17e44801

  • SHA256

    4f7a10e508c29908c67c4b3741463db437e64dc943bf845a92000d704625e83c

  • SHA512

    a28d6674a1760dac5db06ff8cd25804c258bde9984c888353c5c722be3dd0f04a6ff0fb4eb093fcec9f35e01edac18168eda3293d2578366d36c39a7c2721240

  • SSDEEP

    1536:I+4g0upfl+9yKT1heC+cX41JNFR5z4Mb+KR0Nc8QsJq39:j4luZ48Ae7cXgR5z4e0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.60.130:4444

Targets

    • Target

      4f7a10e508c29908c67c4b3741463db437e64dc943bf845a92000d704625e83cN.exe

    • Size

      72KB

    • MD5

      f21a365325301db80dddb6185cdabcc0

    • SHA1

      c74f7c0a764ea51efb1994c41ca01fea17e44801

    • SHA256

      4f7a10e508c29908c67c4b3741463db437e64dc943bf845a92000d704625e83c

    • SHA512

      a28d6674a1760dac5db06ff8cd25804c258bde9984c888353c5c722be3dd0f04a6ff0fb4eb093fcec9f35e01edac18168eda3293d2578366d36c39a7c2721240

    • SSDEEP

      1536:I+4g0upfl+9yKT1heC+cX41JNFR5z4Mb+KR0Nc8QsJq39:j4luZ48Ae7cXgR5z4e0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks