General

  • Target

    c7e0ea365be90b4e6c62ff885800d34aecc4e503a2d7a5de766a7c28c5e1b8a2

  • Size

    574KB

  • Sample

    241223-t68bqsvneq

  • MD5

    130857a81cf2d684ff9da2ae4f6ffb33

  • SHA1

    5b9ad76caf036290c24c7013d1afada80f658ada

  • SHA256

    c7e0ea365be90b4e6c62ff885800d34aecc4e503a2d7a5de766a7c28c5e1b8a2

  • SHA512

    186dbd863dfd368070b3178f73abe18854648a3bece300eba647ac0624ac0dfdcbfaadefc277af2033f2e170147ce870b09b1f62e73cbfd26b7cf7d46411f7a3

  • SSDEEP

    6144:O5aMJNLwL73PZPkFr1jilzqqVWk6855JKSFtIooEbQ3iZqeTbxWzMI1qeBWiKlB8:OOxPkPjQeqQ1Y53KR3PeIoVgHSS

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.1.115:5555

Targets

    • Target

      c7e0ea365be90b4e6c62ff885800d34aecc4e503a2d7a5de766a7c28c5e1b8a2

    • Size

      574KB

    • MD5

      130857a81cf2d684ff9da2ae4f6ffb33

    • SHA1

      5b9ad76caf036290c24c7013d1afada80f658ada

    • SHA256

      c7e0ea365be90b4e6c62ff885800d34aecc4e503a2d7a5de766a7c28c5e1b8a2

    • SHA512

      186dbd863dfd368070b3178f73abe18854648a3bece300eba647ac0624ac0dfdcbfaadefc277af2033f2e170147ce870b09b1f62e73cbfd26b7cf7d46411f7a3

    • SSDEEP

      6144:O5aMJNLwL73PZPkFr1jilzqqVWk6855JKSFtIooEbQ3iZqeTbxWzMI1qeBWiKlB8:OOxPkPjQeqQ1Y53KR3PeIoVgHSS

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks