General

  • Target

    ba42734309c09becd02d7316b10d300b569295af525143c7226e41d134b804f2.ps1

  • Size

    1KB

  • Sample

    250330-hxpx9avl12

  • MD5

    6cedc4e1091b48b0b968acce2fe33fdc

  • SHA1

    e0262eb44e82188ec7ff61670603445f1e79b59c

  • SHA256

    ba42734309c09becd02d7316b10d300b569295af525143c7226e41d134b804f2

  • SHA512

    118c1406e3941340862474d2fe2f2d4c3c08baf6e2b691f343b45cfaaa3bd1b242f20be0db20f125c0188f16e4b59e90456e1a01be843d780aa285bc5e128c9e

Malware Config

Extracted

Family

metasploit

Version

metasploit_stager

C2

89.168.48.110:4444

Targets

    • Target

      ba42734309c09becd02d7316b10d300b569295af525143c7226e41d134b804f2.ps1

    • Size

      1KB

    • MD5

      6cedc4e1091b48b0b968acce2fe33fdc

    • SHA1

      e0262eb44e82188ec7ff61670603445f1e79b59c

    • SHA256

      ba42734309c09becd02d7316b10d300b569295af525143c7226e41d134b804f2

    • SHA512

      118c1406e3941340862474d2fe2f2d4c3c08baf6e2b691f343b45cfaaa3bd1b242f20be0db20f125c0188f16e4b59e90456e1a01be843d780aa285bc5e128c9e

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.