General

  • Target

    Document.bat

  • Size

    6KB

  • Sample

    241115-wvzassygma

  • MD5

    6bdc18d89eac8169f6783f768259ea94

  • SHA1

    fa8d50f329b569909342fec35ec5e85eb1fc7e17

  • SHA256

    00e92245ffdb75ba3700073c59eb3df585fb87f99d6eacb874899a471fbe4c6d

  • SHA512

    ff8341450506a72910443a3ba53d3039b6a0e60930afed7f0ddcf40aa9f6a0d648fe83fa7171cae4fbfb3eff8354e5b498b91005b1d83790a97118cbf119c68b

  • SSDEEP

    192:+n2jh1hqT2ZV/2aBTmmXCxsUo4/cB8FScgIJe2dHhW:+n2jh1hs2V9kmXCxTo4hYcgIdHhW

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

89.197.154.116:7810

Targets

    • Target

      Document.bat

    • Size

      6KB

    • MD5

      6bdc18d89eac8169f6783f768259ea94

    • SHA1

      fa8d50f329b569909342fec35ec5e85eb1fc7e17

    • SHA256

      00e92245ffdb75ba3700073c59eb3df585fb87f99d6eacb874899a471fbe4c6d

    • SHA512

      ff8341450506a72910443a3ba53d3039b6a0e60930afed7f0ddcf40aa9f6a0d648fe83fa7171cae4fbfb3eff8354e5b498b91005b1d83790a97118cbf119c68b

    • SSDEEP

      192:+n2jh1hqT2ZV/2aBTmmXCxsUo4/cB8FScgIJe2dHhW:+n2jh1hs2V9kmXCxTo4hYcgIdHhW

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

MITRE ATT&CK Enterprise v15

Tasks