General

  • Target

    29de0e63bae61e19db697dc57db08106cac85ad8b1c9a572378d4a66ee9bc977.zip

  • Size

    14KB

  • Sample

    250325-rp4aca1lt7

  • MD5

    e26a6196279fcf18e31f822d1b167573

  • SHA1

    ed29e9ce2b0d8d20733d2b57dc58092cf30572ab

  • SHA256

    29de0e63bae61e19db697dc57db08106cac85ad8b1c9a572378d4a66ee9bc977

  • SHA512

    143384a57d680ce00c9b5f7dfcd52d170a2e4950a0b1caaf109f21d57f7511ea2c65d52bf7ed7f35196e657f91b174b602bc6cefbc78d0ba3c6e801f5bd5f973

  • SSDEEP

    384:w9nyRkb5vGz2FdpVUUOAycrDXBeMULnm52jNJ2:wPAzi7VQMrB9jIjj2

Malware Config

Extracted

Family

metasploit

Version

windows/download_exec

C2

http://skyblueav.com:80/1tAv

Attributes
  • headers User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET CLR 2.0.50727; InfoPath.2)

Targets

    • Target

      a1400765e9663e5d9371ec55bb1080e32213380239b695f101d9910d072268fa.doc

    • Size

      42KB

    • MD5

      aa088b5feb939189376f8ff847810542

    • SHA1

      2adc19991578ec1fa66dc354555f08c964c1a146

    • SHA256

      a1400765e9663e5d9371ec55bb1080e32213380239b695f101d9910d072268fa

    • SHA512

      05c22fd812e21524c09233db4956daa0a0ab0f2e5574e76b3c13e57b38661e8021b1f3595b2c2a0efc340dd72fcfada9742dc472c9d814f142de3e6099f4c3a4

    • SSDEEP

      384:Q8iSUR/8dSAZs+pek/id88MPPZ9JbT9AukyzQ/SDQM1k9Dey0jEm/otP:y/q8+pekqd88aZ9JFWSrG1Jm/e

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks