General

  • Target

    904fecc2b4d5040fd81546c9d6cec35adbbf9d1ba5337af9f4b930bddafb6bc0N.exe

  • Size

    72KB

  • Sample

    241204-h33fjaxlfy

  • MD5

    7fc6b7778b60e3ad77515b95512d1810

  • SHA1

    0733f541d6c65e6a2d10a4971a9ef03b3e5f62ec

  • SHA256

    904fecc2b4d5040fd81546c9d6cec35adbbf9d1ba5337af9f4b930bddafb6bc0

  • SHA512

    bb79ed32cdb786f72c23cd958c6e5cb90d2176b0e597260b65bfdf4698f9f248d56d26255589b9b6a6c309b74a882d565a2834cde4bced0c0c6547f11d14b19b

  • SSDEEP

    1536:Ixutmeb/qZ9UTcSe723fo8b3Mb+KR0Nc8QsJq39:IKTTDU2g8b3e0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.1.10:4444

Targets

    • Target

      904fecc2b4d5040fd81546c9d6cec35adbbf9d1ba5337af9f4b930bddafb6bc0N.exe

    • Size

      72KB

    • MD5

      7fc6b7778b60e3ad77515b95512d1810

    • SHA1

      0733f541d6c65e6a2d10a4971a9ef03b3e5f62ec

    • SHA256

      904fecc2b4d5040fd81546c9d6cec35adbbf9d1ba5337af9f4b930bddafb6bc0

    • SHA512

      bb79ed32cdb786f72c23cd958c6e5cb90d2176b0e597260b65bfdf4698f9f248d56d26255589b9b6a6c309b74a882d565a2834cde4bced0c0c6547f11d14b19b

    • SSDEEP

      1536:Ixutmeb/qZ9UTcSe723fo8b3Mb+KR0Nc8QsJq39:IKTTDU2g8b3e0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

MITRE ATT&CK Enterprise v15

Tasks