General

  • Target

    ef3057c2b1e9b1e11c093a6139c402a1f73f8f9ce30c88451ebf1e967d345b29

  • Size

    97KB

  • Sample

    240925-pvlalsygjh

  • MD5

    800d44b25f8352240fe26c9146e0e48e

  • SHA1

    e3ff6a9e1747fa972a5dbfd1cc4fa0f1df8d60c8

  • SHA256

    ef3057c2b1e9b1e11c093a6139c402a1f73f8f9ce30c88451ebf1e967d345b29

  • SHA512

    1ddc136aca0e3e4a39bcf8b46c895b63c7e19c7b5ebeb405c5a70a8f0ef231eeac0913e0707f5f0bde97984de67dcb24e6d74e15d7336bb8d63303f7744ac873

  • SSDEEP

    1536:Rwo5YqtFiuQIid5OCbTIxPPvMtUBpyBPcsV6GcLXzth6g:RwLGh6g

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

172.16.230.204:2422

Targets

    • Target

      ef3057c2b1e9b1e11c093a6139c402a1f73f8f9ce30c88451ebf1e967d345b29

    • Size

      97KB

    • MD5

      800d44b25f8352240fe26c9146e0e48e

    • SHA1

      e3ff6a9e1747fa972a5dbfd1cc4fa0f1df8d60c8

    • SHA256

      ef3057c2b1e9b1e11c093a6139c402a1f73f8f9ce30c88451ebf1e967d345b29

    • SHA512

      1ddc136aca0e3e4a39bcf8b46c895b63c7e19c7b5ebeb405c5a70a8f0ef231eeac0913e0707f5f0bde97984de67dcb24e6d74e15d7336bb8d63303f7744ac873

    • SSDEEP

      1536:Rwo5YqtFiuQIid5OCbTIxPPvMtUBpyBPcsV6GcLXzth6g:RwLGh6g

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks