General

  • Target

    b0ac539c5c4e9779801fe4cad998d52ea8ff5d683c5d403a0c2e8baa97263b6bN.exe

  • Size

    72KB

  • Sample

    240925-kkvdbayejc

  • MD5

    a4dff961ad4c78f91ac39cbe431acba0

  • SHA1

    99a2f985bd5cd440447902bab238226abd81cad3

  • SHA256

    b0ac539c5c4e9779801fe4cad998d52ea8ff5d683c5d403a0c2e8baa97263b6b

  • SHA512

    aa294d34358c96c80e152be74068740c7dfe6b24fcde1fbc11a2cc63878330bb39da7c90316a8b40b40e30892047cf2cdd50b6b7eedf3939b70d81aea48d434a

  • SSDEEP

    1536:I/UnGGTAxz4cazSdERLqRG3sMb+KR0Nc8QsJq39:eUn6xzjazSdwGose0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

172.20.10.3:4444

Targets

    • Target

      b0ac539c5c4e9779801fe4cad998d52ea8ff5d683c5d403a0c2e8baa97263b6bN.exe

    • Size

      72KB

    • MD5

      a4dff961ad4c78f91ac39cbe431acba0

    • SHA1

      99a2f985bd5cd440447902bab238226abd81cad3

    • SHA256

      b0ac539c5c4e9779801fe4cad998d52ea8ff5d683c5d403a0c2e8baa97263b6b

    • SHA512

      aa294d34358c96c80e152be74068740c7dfe6b24fcde1fbc11a2cc63878330bb39da7c90316a8b40b40e30892047cf2cdd50b6b7eedf3939b70d81aea48d434a

    • SSDEEP

      1536:I/UnGGTAxz4cazSdERLqRG3sMb+KR0Nc8QsJq39:eUn6xzjazSdwGose0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks