General

  • Target

    y4KuA3gUoq.exe

  • Size

    9.3MB

  • Sample

    241206-1eskjaymcs

  • MD5

    f00cc3acb0edc971bfd70ccb98fc3701

  • SHA1

    17f2a141768b85952140c4a2141cd18b8845844b

  • SHA256

    15ab521e069455d069f96c79434d746dd110fa76b9b8367c9118ec6e23432dea

  • SHA512

    03d95b2a0c75b826c77dddc3679929b422f505d53399f1a32f8016f1ff0a908a57dac492a7ee204045411523245cee0aa14f98f38f2aba56e01ffc054d691ab9

  • SSDEEP

    98304:QOzH+XBts1rX50JU8qB+TciBavxGYfVtYzGbAnMklK/5Xo+IFoNngx1FRh4EO9lN:QOr+XwBqcgUt+MpmQNshJOsK7

Malware Config

Extracted

Family

metasploit

Version

metasploit_stager

C2

0.0.0.0:0

Targets

    • Target

      y4KuA3gUoq.exe

    • Size

      9.3MB

    • MD5

      f00cc3acb0edc971bfd70ccb98fc3701

    • SHA1

      17f2a141768b85952140c4a2141cd18b8845844b

    • SHA256

      15ab521e069455d069f96c79434d746dd110fa76b9b8367c9118ec6e23432dea

    • SHA512

      03d95b2a0c75b826c77dddc3679929b422f505d53399f1a32f8016f1ff0a908a57dac492a7ee204045411523245cee0aa14f98f38f2aba56e01ffc054d691ab9

    • SSDEEP

      98304:QOzH+XBts1rX50JU8qB+TciBavxGYfVtYzGbAnMklK/5Xo+IFoNngx1FRh4EO9lN:QOr+XwBqcgUt+MpmQNshJOsK7

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks