General

  • Target

    payload (1).exe

  • Size

    72KB

  • Sample

    241225-t9ylpsyrdq

  • MD5

    f3be4c9e11813932eacdf383d12c07d5

  • SHA1

    7537a2464bf4bcb33137f8db5438452662ed3138

  • SHA256

    66fd34d63c9269d03c0cce26656ee1d94fc181fda5617900b7106c1603dc34d7

  • SHA512

    b0c316856bc4540137256eb52a381ee04deaf90ca5ae3f0357dfe6a9de22d8927b81190dc6fa87b03016e07397ef51ed751d3abd8662f67f357f550581f1660c

  • SSDEEP

    1536:I0E0tSuyhNz/EnW1B1QAvtoMDsy/APMb+KR0Nc8QsJq39:VEMvyPLEq1QgWBy/APe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

10.211.55.10:4444

Targets

    • Target

      payload (1).exe

    • Size

      72KB

    • MD5

      f3be4c9e11813932eacdf383d12c07d5

    • SHA1

      7537a2464bf4bcb33137f8db5438452662ed3138

    • SHA256

      66fd34d63c9269d03c0cce26656ee1d94fc181fda5617900b7106c1603dc34d7

    • SHA512

      b0c316856bc4540137256eb52a381ee04deaf90ca5ae3f0357dfe6a9de22d8927b81190dc6fa87b03016e07397ef51ed751d3abd8662f67f357f550581f1660c

    • SSDEEP

      1536:I0E0tSuyhNz/EnW1B1QAvtoMDsy/APMb+KR0Nc8QsJq39:VEMvyPLEq1QgWBy/APe0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

MITRE ATT&CK Enterprise v15

Tasks