General

  • Target

    system404.exe

  • Size

    72KB

  • Sample

    241213-my39gswlez

  • MD5

    5cf4fd83c632025a479544de58d05c7e

  • SHA1

    911c13319381c254b5b4b768e11628cb08c4cd59

  • SHA256

    03cfaaa0f04f424b6f426063f25c8f51ca030c47f8b09fdb120063c95fa5255e

  • SHA512

    029642de076e54ed85aa2e1835db0bd3ad5119393db4a146204befff65302f3e19c3962fa7b4cdad73f694908049824d8c2fd3643d87d202f9462dfb0908c598

  • SSDEEP

    1536:IEE/Bv3kIjKgFqsIVklxEUIMb+KR0Nc8QsJq39:03nugF7Ioee0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

147.185.221.19:58142

Targets

    • Target

      system404.exe

    • Size

      72KB

    • MD5

      5cf4fd83c632025a479544de58d05c7e

    • SHA1

      911c13319381c254b5b4b768e11628cb08c4cd59

    • SHA256

      03cfaaa0f04f424b6f426063f25c8f51ca030c47f8b09fdb120063c95fa5255e

    • SHA512

      029642de076e54ed85aa2e1835db0bd3ad5119393db4a146204befff65302f3e19c3962fa7b4cdad73f694908049824d8c2fd3643d87d202f9462dfb0908c598

    • SSDEEP

      1536:IEE/Bv3kIjKgFqsIVklxEUIMb+KR0Nc8QsJq39:03nugF7Ioee0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

MITRE ATT&CK Enterprise v15

Tasks