General

  • Target

    Bypass2.bat

  • Size

    6KB

  • Sample

    241115-wtwhhsyhqk

  • MD5

    3e80d6cc87e7d4207fb3e7dc9b70d226

  • SHA1

    d39cfe382fbe9b7cde6dff006e1c08089508f1ae

  • SHA256

    06e1fa53ef3878101c1591ec3fa629e766d3fe47c142a6164b2aabcd397359bd

  • SHA512

    4dd271b014c4948ade1f7a46f3c3e5c6fa0ef9f8cca77cac29ac3c4ae0f3b44e455a697b7b3eeb9feca55ab539a3448556ba9b1afa1dd2d5aaafb80b5c7061a5

  • SSDEEP

    192:+n2jh1hqTjRjZ5mpwGHWf540neCmNDPVMCKF6hdC:+n2jh1hsj6sRBnMNDPVM0hdC

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

89.197.154.116:7810

Targets

    • Target

      Bypass2.bat

    • Size

      6KB

    • MD5

      3e80d6cc87e7d4207fb3e7dc9b70d226

    • SHA1

      d39cfe382fbe9b7cde6dff006e1c08089508f1ae

    • SHA256

      06e1fa53ef3878101c1591ec3fa629e766d3fe47c142a6164b2aabcd397359bd

    • SHA512

      4dd271b014c4948ade1f7a46f3c3e5c6fa0ef9f8cca77cac29ac3c4ae0f3b44e455a697b7b3eeb9feca55ab539a3448556ba9b1afa1dd2d5aaafb80b5c7061a5

    • SSDEEP

      192:+n2jh1hqTjRjZ5mpwGHWf540neCmNDPVMCKF6hdC:+n2jh1hsj6sRBnMNDPVM0hdC

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

MITRE ATT&CK Enterprise v15

Tasks