General

  • Target

    582d283ac3f69c8878c07d0af4c95884335f7ba52210edf00645954b0ea5fe12

  • Size

    49KB

  • Sample

    241102-z4akkswcnr

  • MD5

    fcc8f7e62272436e33cac2072991ffd8

  • SHA1

    8b4dee10d556864889cfbc089aee0dfc9f4df92a

  • SHA256

    582d283ac3f69c8878c07d0af4c95884335f7ba52210edf00645954b0ea5fe12

  • SHA512

    177f286b82d76add24d94bee8c08e0218c4fb104c015c22235217d17500bf391ae059d815cbec7e4ce859060506754f50e26c4705277edc37869eca1dded9d40

  • SSDEEP

    768:ML3y9gMFeFaW4HiOE9h2VRHelsQfhcTgzs26WX0Sj:uy9gMFeFaW4Hch2VJe2O+oPj

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.0.112:4444

Targets

    • Target

      582d283ac3f69c8878c07d0af4c95884335f7ba52210edf00645954b0ea5fe12

    • Size

      49KB

    • MD5

      fcc8f7e62272436e33cac2072991ffd8

    • SHA1

      8b4dee10d556864889cfbc089aee0dfc9f4df92a

    • SHA256

      582d283ac3f69c8878c07d0af4c95884335f7ba52210edf00645954b0ea5fe12

    • SHA512

      177f286b82d76add24d94bee8c08e0218c4fb104c015c22235217d17500bf391ae059d815cbec7e4ce859060506754f50e26c4705277edc37869eca1dded9d40

    • SSDEEP

      768:ML3y9gMFeFaW4HiOE9h2VRHelsQfhcTgzs26WX0Sj:uy9gMFeFaW4Hch2VJe2O+oPj

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

MITRE ATT&CK Enterprise v15

Tasks