General

  • Target

    42e55c8a45200dde96062e5899518733f8f7c504c72fd4b86a793ba22dec3dcc

  • Size

    647KB

  • Sample

    241202-zkqsfsxphm

  • MD5

    74002a194360682b006cca283e1cf4e8

  • SHA1

    6c037c51df859c1dee31ef88300a8a1a325c30e0

  • SHA256

    42e55c8a45200dde96062e5899518733f8f7c504c72fd4b86a793ba22dec3dcc

  • SHA512

    870bbfab1508d9dee43fbb51e1e5be1956274f143fee0095e8f11fec3e4c6ae9a4c20c1a38566d415b62d1b0f9b55d9dfb9b239c93e7f2aae7b6e91eaad1c48a

  • SSDEEP

    12288:cyveQB/fTHIGaPkKEYzURNAwbAgli5/XoEQZOvG/C+O4+S8HiK425O9AJ:cuDXTIGaPhEYzUzA065ovZHtOOML89AJ

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.1.64:1479

Targets

    • Target

      42e55c8a45200dde96062e5899518733f8f7c504c72fd4b86a793ba22dec3dcc

    • Size

      647KB

    • MD5

      74002a194360682b006cca283e1cf4e8

    • SHA1

      6c037c51df859c1dee31ef88300a8a1a325c30e0

    • SHA256

      42e55c8a45200dde96062e5899518733f8f7c504c72fd4b86a793ba22dec3dcc

    • SHA512

      870bbfab1508d9dee43fbb51e1e5be1956274f143fee0095e8f11fec3e4c6ae9a4c20c1a38566d415b62d1b0f9b55d9dfb9b239c93e7f2aae7b6e91eaad1c48a

    • SSDEEP

      12288:cyveQB/fTHIGaPkKEYzURNAwbAgli5/XoEQZOvG/C+O4+S8HiK425O9AJ:cuDXTIGaPhEYzUzA065ovZHtOOML89AJ

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks