General

  • Target

    7259e754edaaad936a67ed4d9328e703eae34b1ec68f51e9e0ebe77de12ffcf6

  • Size

    72KB

  • Sample

    241005-2mfflsveqj

  • MD5

    933842cea72f5bf2157e48d4bf06afb7

  • SHA1

    81429dc7a47b4684d696791a83349b4b89d96fec

  • SHA256

    7259e754edaaad936a67ed4d9328e703eae34b1ec68f51e9e0ebe77de12ffcf6

  • SHA512

    0ae8821c92d955a59170801b3c4fc853bbe2dad1c7159356fb5dab0ba4bf7908a7d7fa6c23e014deeb412dc2053eb75b5c3624f96bd4ef1df6869a6da580f437

  • SSDEEP

    1536:IrDAf1UsasdIeVXcQYbFsyQQRYQAtM91Mb+KR0Nc8QsJq39:uiImIepERRTY3ce0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.1.136:5555

Targets

    • Target

      7259e754edaaad936a67ed4d9328e703eae34b1ec68f51e9e0ebe77de12ffcf6

    • Size

      72KB

    • MD5

      933842cea72f5bf2157e48d4bf06afb7

    • SHA1

      81429dc7a47b4684d696791a83349b4b89d96fec

    • SHA256

      7259e754edaaad936a67ed4d9328e703eae34b1ec68f51e9e0ebe77de12ffcf6

    • SHA512

      0ae8821c92d955a59170801b3c4fc853bbe2dad1c7159356fb5dab0ba4bf7908a7d7fa6c23e014deeb412dc2053eb75b5c3624f96bd4ef1df6869a6da580f437

    • SSDEEP

      1536:IrDAf1UsasdIeVXcQYbFsyQQRYQAtM91Mb+KR0Nc8QsJq39:uiImIepERRTY3ce0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks