General

  • Target

    payload.exe

  • Size

    72KB

  • Sample

    241228-22dkkavlfn

  • MD5

    a761195663b6d4ca21daf517faaa1765

  • SHA1

    39dfc688001598806bf44eb1cfc08281a1566d7c

  • SHA256

    82a539dd37e4628199a5c9cccf2ac826a64cfe3023eaeb35bc7300acfc6d6871

  • SHA512

    89322d9b3e9595e6e2feca0b9fc26099bddbc245454f51441ca5f01235545bdaf493486f774486a1555143f13efa90d318ebb2a846ecbc885d0f3d4e4342c517

  • SSDEEP

    1536:IcazskDvluMDDtE4KFaKVWXMb+KR0Nc8QsJq39:dTkDv0QWdaKwe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.1.115:4444

Targets

    • Target

      payload.exe

    • Size

      72KB

    • MD5

      a761195663b6d4ca21daf517faaa1765

    • SHA1

      39dfc688001598806bf44eb1cfc08281a1566d7c

    • SHA256

      82a539dd37e4628199a5c9cccf2ac826a64cfe3023eaeb35bc7300acfc6d6871

    • SHA512

      89322d9b3e9595e6e2feca0b9fc26099bddbc245454f51441ca5f01235545bdaf493486f774486a1555143f13efa90d318ebb2a846ecbc885d0f3d4e4342c517

    • SSDEEP

      1536:IcazskDvluMDDtE4KFaKVWXMb+KR0Nc8QsJq39:dTkDv0QWdaKwe0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

MITRE ATT&CK Enterprise v15

Tasks