General

  • Target

    549129268147b307a6ea87d452d2dc8c11d5221c15c4510b8bca93ab911b145e

  • Size

    28KB

  • Sample

    241205-1l3zvatkcx

  • MD5

    e8ecf92d1e99d8aa71dafc8445de7dda

  • SHA1

    d5a66728282283cd37760b1ff481afc3b380cd2b

  • SHA256

    549129268147b307a6ea87d452d2dc8c11d5221c15c4510b8bca93ab911b145e

  • SHA512

    e9d77778e3717d711b12cdf36ebf0b2828ca30bf9de719d541fb852756b0b6742de9ae57e90eae116ad1163a7500859743560c7232970a9f76d3351da82f9cca

  • SSDEEP

    192:tlLZEvA+6/6r8px8SmvowzxigAFx9O5tPKnZJ1IzBNQJDLpmNatUzmbm:j8iS8px8SMDigoUtitsNQtLM0tK

Malware Config

Extracted

Family

metasploit

Version

windows/download_exec

C2

http://192.168.8.128:80/6Xlb

Attributes
  • headers User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1)

Targets

    • Target

      549129268147b307a6ea87d452d2dc8c11d5221c15c4510b8bca93ab911b145e

    • Size

      28KB

    • MD5

      e8ecf92d1e99d8aa71dafc8445de7dda

    • SHA1

      d5a66728282283cd37760b1ff481afc3b380cd2b

    • SHA256

      549129268147b307a6ea87d452d2dc8c11d5221c15c4510b8bca93ab911b145e

    • SHA512

      e9d77778e3717d711b12cdf36ebf0b2828ca30bf9de719d541fb852756b0b6742de9ae57e90eae116ad1163a7500859743560c7232970a9f76d3351da82f9cca

    • SSDEEP

      192:tlLZEvA+6/6r8px8SmvowzxigAFx9O5tPKnZJ1IzBNQJDLpmNatUzmbm:j8iS8px8SMDigoUtitsNQtLM0tK

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Process spawned suspicious child process

      This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

MITRE ATT&CK Enterprise v15

Tasks