General

  • Target

    c12e1ba55ed1a77b43d60e9c2e682daffb9195d8c6ca6fcd1135ef214bcebff5

  • Size

    76KB

  • Sample

    241218-1rtclasrht

  • MD5

    48be04dfaaed78575b4103d151dca15b

  • SHA1

    7156db91750023c5c4f8d9ce1c75afdadc219377

  • SHA256

    c12e1ba55ed1a77b43d60e9c2e682daffb9195d8c6ca6fcd1135ef214bcebff5

  • SHA512

    c737f4e54189c0cf97b27fbf1ff5c557a9b2014facf94db82e2ce880e550e421bb649e25fb2f15af28fbb451163bbb75b2d5328a3df10330f3566806090b26af

  • SSDEEP

    1536:XcpXXk3lkptEwwcWy9pSufJ0Mq0BM6Gnh8rzd02:CnA6m7yeuiMqjEdH

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

10.10.8.2:55687

Targets

    • Target

      c12e1ba55ed1a77b43d60e9c2e682daffb9195d8c6ca6fcd1135ef214bcebff5

    • Size

      76KB

    • MD5

      48be04dfaaed78575b4103d151dca15b

    • SHA1

      7156db91750023c5c4f8d9ce1c75afdadc219377

    • SHA256

      c12e1ba55ed1a77b43d60e9c2e682daffb9195d8c6ca6fcd1135ef214bcebff5

    • SHA512

      c737f4e54189c0cf97b27fbf1ff5c557a9b2014facf94db82e2ce880e550e421bb649e25fb2f15af28fbb451163bbb75b2d5328a3df10330f3566806090b26af

    • SSDEEP

      1536:XcpXXk3lkptEwwcWy9pSufJ0Mq0BM6Gnh8rzd02:CnA6m7yeuiMqjEdH

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks