General

  • Target

    dcbc5644bb4189099c86499546bede6f72f23ce69cabd1a78e62f0569425e24d.exe

  • Size

    3KB

  • Sample

    241225-yaa4ksvlcq

  • MD5

    1d959c687f58d2ed9d7e14c5267abf53

  • SHA1

    271c5c250294cdf3c3ea3fa3e22887a1c1c78ed4

  • SHA256

    dcbc5644bb4189099c86499546bede6f72f23ce69cabd1a78e62f0569425e24d

  • SHA512

    f8144583cfdefd2bcd91cc6ec6150500fdc4955333351cc8d14f8870cc511135e4943c0bee76d3a8571556f68b42cad88d2c379c0ece2854752a7334bf068f52

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

10.0.2.6:4444

Targets

    • Target

      dcbc5644bb4189099c86499546bede6f72f23ce69cabd1a78e62f0569425e24d.exe

    • Size

      3KB

    • MD5

      1d959c687f58d2ed9d7e14c5267abf53

    • SHA1

      271c5c250294cdf3c3ea3fa3e22887a1c1c78ed4

    • SHA256

      dcbc5644bb4189099c86499546bede6f72f23ce69cabd1a78e62f0569425e24d

    • SHA512

      f8144583cfdefd2bcd91cc6ec6150500fdc4955333351cc8d14f8870cc511135e4943c0bee76d3a8571556f68b42cad88d2c379c0ece2854752a7334bf068f52

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

MITRE ATT&CK Enterprise v15

Tasks