General

  • Target

    msf500k.ps1

  • Size

    501KB

  • Sample

    250328-jhp55stshw

  • MD5

    bbf15ca69b0688ec777475f84edda743

  • SHA1

    ce5bd93e1ccb39def7b8e29cd2beb9d3964f171b

  • SHA256

    9be818a44173a953b708d282de254df6f02f43a4acf1812fc012f7bff20a5503

  • SHA512

    6d004da4f7a3897ade855fa734fc1ae52be66b2667c0af91bdf886cb42afc2b5037ceef943e262977d23ff43b7be4372268c4bfc037cb01b94cf69c4bca4d837

  • SSDEEP

    48:q+MThimb7RBARAbLPorNfAse3+soGoNeVBXTSbS4:BGTXA0PohfXBGoCJ+z

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

10.254.66.59:8888

Targets

    • Target

      msf500k.ps1

    • Size

      501KB

    • MD5

      bbf15ca69b0688ec777475f84edda743

    • SHA1

      ce5bd93e1ccb39def7b8e29cd2beb9d3964f171b

    • SHA256

      9be818a44173a953b708d282de254df6f02f43a4acf1812fc012f7bff20a5503

    • SHA512

      6d004da4f7a3897ade855fa734fc1ae52be66b2667c0af91bdf886cb42afc2b5037ceef943e262977d23ff43b7be4372268c4bfc037cb01b94cf69c4bca4d837

    • SSDEEP

      48:q+MThimb7RBARAbLPorNfAse3+soGoNeVBXTSbS4:BGTXA0PohfXBGoCJ+z

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.