General

  • Target

    1.ps1

  • Size

    2KB

  • Sample

    250328-jdnfratscx

  • MD5

    0872c54372986ab2d2c6afbbd8a59a9c

  • SHA1

    ed968d3c88b76479c0f3b5b4da9f83d9649cb256

  • SHA256

    858415220041b72086f6c8282779b65ac05c7936e4d252400c684fa70d020e41

  • SHA512

    9632d3879ccac093e215bcaa6c204ea83d2086c816b1c8fe859770441451f350401479e1a31cf6603a4c71a64f7bedcba1213c0a1d8745387a73b46dd2209d77

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

10.254.66.59:8888

Targets

    • Target

      1.ps1

    • Size

      2KB

    • MD5

      0872c54372986ab2d2c6afbbd8a59a9c

    • SHA1

      ed968d3c88b76479c0f3b5b4da9f83d9649cb256

    • SHA256

      858415220041b72086f6c8282779b65ac05c7936e4d252400c684fa70d020e41

    • SHA512

      9632d3879ccac093e215bcaa6c204ea83d2086c816b1c8fe859770441451f350401479e1a31cf6603a4c71a64f7bedcba1213c0a1d8745387a73b46dd2209d77

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

MITRE ATT&CK Enterprise v15

Tasks