General

  • Target

    drimloader.exe

  • Size

    119KB

  • Sample

    241231-tw8jraymcz

  • MD5

    df92d716e154851a108d29e1c2e6b904

  • SHA1

    a31f76c9c0043bd993132021b5bb7625e645fd4b

  • SHA256

    8c01bd1e7e9dcc375b0c89143c307ee0f804ec08f02051c298cf6951ff6b7b9d

  • SHA512

    d43ab2d82b3c1caa464c3e015bdd0e583f970d5f01170f9ab819eda1c5fd28e42665973e055e8b704744b9e84d65b62c07d311a81fe8bbfe85a2ea72f0d8524b

  • SSDEEP

    3072:wNWOhN3CuB7sWGB17ZpgO/UrGsoFxC2pFp:wLrXBy/VpgYUwQ2pFp

Malware Config

Extracted

Family

metasploit

Version

metasploit_stager

C2

0.0.0.0:4821

Targets

    • Target

      drimloader.exe

    • Size

      119KB

    • MD5

      df92d716e154851a108d29e1c2e6b904

    • SHA1

      a31f76c9c0043bd993132021b5bb7625e645fd4b

    • SHA256

      8c01bd1e7e9dcc375b0c89143c307ee0f804ec08f02051c298cf6951ff6b7b9d

    • SHA512

      d43ab2d82b3c1caa464c3e015bdd0e583f970d5f01170f9ab819eda1c5fd28e42665973e055e8b704744b9e84d65b62c07d311a81fe8bbfe85a2ea72f0d8524b

    • SSDEEP

      3072:wNWOhN3CuB7sWGB17ZpgO/UrGsoFxC2pFp:wLrXBy/VpgYUwQ2pFp

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

MITRE ATT&CK Matrix

Tasks