General

  • Target

    1ea83cd8d0c4e4bae0350134557b78405b0e1c0d4efb9894a284d2c608b08542N

  • Size

    72KB

  • Sample

    241107-w4nknazjhq

  • MD5

    9b03ef15da6ed0f5a550ce65e509adf0

  • SHA1

    c3de24879caaa97bda14496a3030f32973b667f7

  • SHA256

    1ea83cd8d0c4e4bae0350134557b78405b0e1c0d4efb9894a284d2c608b08542

  • SHA512

    5dbcdcf3610b24b7ec5bc7a0910caed361c7b3c807767ab5b273576b3d40266ccd2d9ff5639fcc1e75000be86a860dfff29ba3acaa9a430eb187f3b9e557ffff

  • SSDEEP

    1536:IoVcsjVOR4T2FwVnqwX8AzHOkMb+KR0Nc8QsJq39:nJA4T2aVqwXvve0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.47.141:2404

Targets

    • Target

      1ea83cd8d0c4e4bae0350134557b78405b0e1c0d4efb9894a284d2c608b08542N

    • Size

      72KB

    • MD5

      9b03ef15da6ed0f5a550ce65e509adf0

    • SHA1

      c3de24879caaa97bda14496a3030f32973b667f7

    • SHA256

      1ea83cd8d0c4e4bae0350134557b78405b0e1c0d4efb9894a284d2c608b08542

    • SHA512

      5dbcdcf3610b24b7ec5bc7a0910caed361c7b3c807767ab5b273576b3d40266ccd2d9ff5639fcc1e75000be86a860dfff29ba3acaa9a430eb187f3b9e557ffff

    • SSDEEP

      1536:IoVcsjVOR4T2FwVnqwX8AzHOkMb+KR0Nc8QsJq39:nJA4T2aVqwXvve0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

MITRE ATT&CK Enterprise v15

Tasks