General

  • Target

    ec6495eb01b0e205e4e3f4e8f85ef3fa4ef8680c236bab5c7c0f02c3b360ba7f

  • Size

    5.5MB

  • Sample

    241126-f9expstlcm

  • MD5

    81ffe820eadd46ea42cc17d074d0321e

  • SHA1

    37aedfb02e4c6bb281779e671bb5bbe42197841f

  • SHA256

    ec6495eb01b0e205e4e3f4e8f85ef3fa4ef8680c236bab5c7c0f02c3b360ba7f

  • SHA512

    28787aa6ccc7666348c17cab777fb89d4846513fc9ae21ea8ebd9fe713147b284e96991933b24157629269803bcf0a6813c7e2504b2cdecf66607d2821139352

  • SSDEEP

    49152:UVJjcsVXXpDYALLRENU9Qd+buk8u/HxjCLdJdZc4rgDQMHLZQB+ELtH1PDCYxEBF:UVJjceXWU9w6ZZHEXJ/BPLdtSf7

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

172.20.10.2:88

Targets

    • Target

      ec6495eb01b0e205e4e3f4e8f85ef3fa4ef8680c236bab5c7c0f02c3b360ba7f

    • Size

      5.5MB

    • MD5

      81ffe820eadd46ea42cc17d074d0321e

    • SHA1

      37aedfb02e4c6bb281779e671bb5bbe42197841f

    • SHA256

      ec6495eb01b0e205e4e3f4e8f85ef3fa4ef8680c236bab5c7c0f02c3b360ba7f

    • SHA512

      28787aa6ccc7666348c17cab777fb89d4846513fc9ae21ea8ebd9fe713147b284e96991933b24157629269803bcf0a6813c7e2504b2cdecf66607d2821139352

    • SSDEEP

      49152:UVJjcsVXXpDYALLRENU9Qd+buk8u/HxjCLdJdZc4rgDQMHLZQB+ELtH1PDCYxEBF:UVJjceXWU9w6ZZHEXJ/BPLdtSf7

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks for any installed AV software in registry

MITRE ATT&CK Enterprise v15

Tasks