General

  • Target

    9c440ce5374b11c0a21cc567d9f68c0594366e286675f23ef535542708bf5053

  • Size

    83KB

  • Sample

    241202-1pkyfavjhs

  • MD5

    8b953a6aa2ac81a5d0a81d229efbab74

  • SHA1

    b1d969d29ad7242d673daef8d7999358d8f4eca5

  • SHA256

    9c440ce5374b11c0a21cc567d9f68c0594366e286675f23ef535542708bf5053

  • SHA512

    03b14aadb90c84a4aa0363e00dbee55b40b8b5bf1efc54228a6db50dd668794951488ae8721e68f43bdb001b3e95dc4b41115bf51a3509907b91d4c0d7318e50

  • SSDEEP

    1536:cn+WqQuctgd8mz1RSOWMrqYrF8CqY6kbBQIGg1e05rx/tssTmzgigOXClG:A+X8YFH3rqYRRqJkAulasacJOCU

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

10.211.55.3:4444

Targets

    • Target

      9c440ce5374b11c0a21cc567d9f68c0594366e286675f23ef535542708bf5053

    • Size

      83KB

    • MD5

      8b953a6aa2ac81a5d0a81d229efbab74

    • SHA1

      b1d969d29ad7242d673daef8d7999358d8f4eca5

    • SHA256

      9c440ce5374b11c0a21cc567d9f68c0594366e286675f23ef535542708bf5053

    • SHA512

      03b14aadb90c84a4aa0363e00dbee55b40b8b5bf1efc54228a6db50dd668794951488ae8721e68f43bdb001b3e95dc4b41115bf51a3509907b91d4c0d7318e50

    • SSDEEP

      1536:cn+WqQuctgd8mz1RSOWMrqYrF8CqY6kbBQIGg1e05rx/tssTmzgigOXClG:A+X8YFH3rqYRRqJkAulasacJOCU

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks