General

  • Target

    2e10f8d4a73b233b66460f396c6214d3fb8f4c0b49d9ba767e422bb5487203c8

  • Size

    651KB

  • Sample

    241228-pww4haxrct

  • MD5

    957ef78990db598ec9461cf0b2692665

  • SHA1

    3300ae9bea1e25ced3f7ba7ff8c71e41241d1228

  • SHA256

    2e10f8d4a73b233b66460f396c6214d3fb8f4c0b49d9ba767e422bb5487203c8

  • SHA512

    f487f3b56f4a2049d5989e287850538792411ff26d525002becb23ecc4e23a94a5efced363621fb4395e31d62d539da0d1b83f0e9847df616e8c32c9fd70645e

  • SSDEEP

    12288:DHadI8ZWcaInwvsFWSCA1pc7kAbi3WD+AVpK+MHyqk8:7adI8ZWcaSwvOWlAQkQ+eh8

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.10.181:56322

Targets

    • Target

      2e10f8d4a73b233b66460f396c6214d3fb8f4c0b49d9ba767e422bb5487203c8

    • Size

      651KB

    • MD5

      957ef78990db598ec9461cf0b2692665

    • SHA1

      3300ae9bea1e25ced3f7ba7ff8c71e41241d1228

    • SHA256

      2e10f8d4a73b233b66460f396c6214d3fb8f4c0b49d9ba767e422bb5487203c8

    • SHA512

      f487f3b56f4a2049d5989e287850538792411ff26d525002becb23ecc4e23a94a5efced363621fb4395e31d62d539da0d1b83f0e9847df616e8c32c9fd70645e

    • SSDEEP

      12288:DHadI8ZWcaInwvsFWSCA1pc7kAbi3WD+AVpK+MHyqk8:7adI8ZWcaSwvOWlAQkQ+eh8

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

MITRE ATT&CK Enterprise v15

Tasks