General

  • Target

    9fe0dd7ecccbc2349f1eb7cd1b448e07b2dafb52da465a66d929616e26412fa4

  • Size

    54KB

  • Sample

    241209-rvdlwavrdr

  • MD5

    4ce2f585a166e293bdeed0f12ecb5524

  • SHA1

    d624576d409731c496f037b9d75f5c14bb067b89

  • SHA256

    9fe0dd7ecccbc2349f1eb7cd1b448e07b2dafb52da465a66d929616e26412fa4

  • SHA512

    2d11e83f55fc67fde6638bdf863656096ebe47d989eb3524077b0cc59a1db8a044789c0e8141ce52c7a202581e81a2a5368d80763ab6beb65e0a31c76299cc49

  • SSDEEP

    768:hqcyGIkugasbD2grj5lhziO1/EwtMOXmdY1i3YgAIYCH0I+kW947f:xjI1gtD2MiOZ1GOXmdYXgAvCBj

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.50.96:2405

Targets

    • Target

      9fe0dd7ecccbc2349f1eb7cd1b448e07b2dafb52da465a66d929616e26412fa4

    • Size

      54KB

    • MD5

      4ce2f585a166e293bdeed0f12ecb5524

    • SHA1

      d624576d409731c496f037b9d75f5c14bb067b89

    • SHA256

      9fe0dd7ecccbc2349f1eb7cd1b448e07b2dafb52da465a66d929616e26412fa4

    • SHA512

      2d11e83f55fc67fde6638bdf863656096ebe47d989eb3524077b0cc59a1db8a044789c0e8141ce52c7a202581e81a2a5368d80763ab6beb65e0a31c76299cc49

    • SSDEEP

      768:hqcyGIkugasbD2grj5lhziO1/EwtMOXmdY1i3YgAIYCH0I+kW947f:xjI1gtD2MiOZ1GOXmdYXgAvCBj

    Score
    5/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks