General

  • Target

    payload.exe

  • Size

    72KB

  • Sample

    240627-tqxv3a1hjq

  • MD5

    0cb1bb3f083e3150e114cb4a0bf57e67

  • SHA1

    d1f9bf7f1ac9c05337d2e98eaab9e23f7a7dd8c3

  • SHA256

    fd00b1cd972d08f081320c138d15a93c3503586c3ceec3d054b91d80703e8202

  • SHA512

    c2347b3b0a24bb40283b8ba96c12fe32174a768b53c4ddc2823c46091db7f4e2b9edafc475559367059292691e98739580ff0b098551b4992b83079bde2718c4

  • SSDEEP

    1536:I0pINi997d6z4kuADLYmd4BbBOr8CCpMb+KR0Nc8QsJq39:+iT748kuIceV89e0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.1.113:4444

Targets

    • Target

      payload.exe

    • Size

      72KB

    • MD5

      0cb1bb3f083e3150e114cb4a0bf57e67

    • SHA1

      d1f9bf7f1ac9c05337d2e98eaab9e23f7a7dd8c3

    • SHA256

      fd00b1cd972d08f081320c138d15a93c3503586c3ceec3d054b91d80703e8202

    • SHA512

      c2347b3b0a24bb40283b8ba96c12fe32174a768b53c4ddc2823c46091db7f4e2b9edafc475559367059292691e98739580ff0b098551b4992b83079bde2718c4

    • SSDEEP

      1536:I0pINi997d6z4kuADLYmd4BbBOr8CCpMb+KR0Nc8QsJq39:+iT748kuIceV89e0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks