General

  • Target

    painfulwashere.exe

  • Size

    72KB

  • Sample

    241210-2yadqstlhw

  • MD5

    42d918009da2dfb89e84420d689c5ecc

  • SHA1

    022e9d934063c7c6d22b04d059cadfee32c58b62

  • SHA256

    7ac1a2e149ca2862478bb901cec0200358682fa1f161ebb5f95001b17c26565b

  • SHA512

    0418a72e37ff2d13e4928b5ffe079cd02120b79ddb6bc7618af4e6c0771cb34542bbbc68b97e1d0c40a4b984b8669b5c551494fd2485e2c5e46570df14883173

  • SSDEEP

    1536:IRcXx4/2IH5Tlx6+9QXpMb+KR0Nc8QsJq39:3kTDtQ5e0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.100.19:1177

Targets

    • Target

      painfulwashere.exe

    • Size

      72KB

    • MD5

      42d918009da2dfb89e84420d689c5ecc

    • SHA1

      022e9d934063c7c6d22b04d059cadfee32c58b62

    • SHA256

      7ac1a2e149ca2862478bb901cec0200358682fa1f161ebb5f95001b17c26565b

    • SHA512

      0418a72e37ff2d13e4928b5ffe079cd02120b79ddb6bc7618af4e6c0771cb34542bbbc68b97e1d0c40a4b984b8669b5c551494fd2485e2c5e46570df14883173

    • SSDEEP

      1536:IRcXx4/2IH5Tlx6+9QXpMb+KR0Nc8QsJq39:3kTDtQ5e0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

MITRE ATT&CK Enterprise v15

Tasks