General

  • Target

    payload.exe

  • Size

    45KB

  • Sample

    241230-d362hawrfw

  • MD5

    71f06d96b11e325efcc45f3d4630e164

  • SHA1

    ac61f6f1e69725f49ae7c869e28ea4d9f3536a3e

  • SHA256

    291f4ee8cac7005e3c8fe5f0ec83ffbb3649265973035310a7bd11da65dcc010

  • SHA512

    d64c3b30a3bc9dc04d68921f515af98a36cae70d8f21a13d283046b4bf615c79e3910b310410f01925e189cac33b693a5115bdcff3a99604cc03e37dabf37efa

  • SSDEEP

    768:IWsyb2WrU57/KQmDF3Xu/uarBuFL3b9FH0rXxF2djqlGS2zaqHcorv3onbcuyD7T:IWAMU57/3yH6r4L3ZFUdmjqkDzaYsno5

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

147.185.221.18:7381

Targets

    • Target

      payload.exe

    • Size

      45KB

    • MD5

      71f06d96b11e325efcc45f3d4630e164

    • SHA1

      ac61f6f1e69725f49ae7c869e28ea4d9f3536a3e

    • SHA256

      291f4ee8cac7005e3c8fe5f0ec83ffbb3649265973035310a7bd11da65dcc010

    • SHA512

      d64c3b30a3bc9dc04d68921f515af98a36cae70d8f21a13d283046b4bf615c79e3910b310410f01925e189cac33b693a5115bdcff3a99604cc03e37dabf37efa

    • SSDEEP

      768:IWsyb2WrU57/KQmDF3Xu/uarBuFL3b9FH0rXxF2djqlGS2zaqHcorv3onbcuyD7T:IWAMU57/3yH6r4L3ZFUdmjqkDzaYsno5

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks