General

  • Target

    星辰魔域.exe

  • Size

    1.8MB

  • Sample

    241213-rkj1xasngn

  • MD5

    af25dc5a87ceeef592b39db453556cc5

  • SHA1

    d7144da6707271544dceef81767a731db26c0f70

  • SHA256

    57e1237c4831d5bad7540e135015262a9f3666c88b3eeebe2181157093498a36

  • SHA512

    e4c0fc8b166c04bdf8580b882a975dce00d67ec3083be73fdc5037f2fc331ccd7e23a3144a993c0123c04d316f3c545437ce76dfb58db2180507ade339cf06a4

  • SSDEEP

    24576:/3vLRdVhZBK8NogWYO09YOGi9J3YiWdCMJ5QxmjwC/hR:/3d5ZQ1YxJIiW0MbQxA

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

1.15.12.73:4567

Targets

    • Target

      星辰魔域.exe

    • Size

      1.8MB

    • MD5

      af25dc5a87ceeef592b39db453556cc5

    • SHA1

      d7144da6707271544dceef81767a731db26c0f70

    • SHA256

      57e1237c4831d5bad7540e135015262a9f3666c88b3eeebe2181157093498a36

    • SHA512

      e4c0fc8b166c04bdf8580b882a975dce00d67ec3083be73fdc5037f2fc331ccd7e23a3144a993c0123c04d316f3c545437ce76dfb58db2180507ade339cf06a4

    • SSDEEP

      24576:/3vLRdVhZBK8NogWYO09YOGi9J3YiWdCMJ5QxmjwC/hR:/3d5ZQ1YxJIiW0MbQxA

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

MITRE ATT&CK Enterprise v15

Tasks