General

  • Target

    75882c357856cf5c78eae252216d90ae8fe2acaded8dfa02452ded9ef3494e82

  • Size

    34KB

  • Sample

    240629-1xkyeaxcpa

  • MD5

    64145b8aedaf03d470a67349fd112b14

  • SHA1

    af0c9e2cfb751f76461c917cee61318eab3b65a5

  • SHA256

    75882c357856cf5c78eae252216d90ae8fe2acaded8dfa02452ded9ef3494e82

  • SHA512

    52dea82fb9433814624a4ec406453457f9a9f39dde436b7676590e164d068e2783673c41d7b5f99996c326cf88b7d579022fe7324d183e067305cfa33af4afb4

  • SSDEEP

    384:2I8iSsqdg1vA9Q60vA01z4+t90+r+p4/LZeSFqi:2F+1o9sYKr+pwZVEi

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.45.229:443

Targets

    • Target

      75882c357856cf5c78eae252216d90ae8fe2acaded8dfa02452ded9ef3494e82

    • Size

      34KB

    • MD5

      64145b8aedaf03d470a67349fd112b14

    • SHA1

      af0c9e2cfb751f76461c917cee61318eab3b65a5

    • SHA256

      75882c357856cf5c78eae252216d90ae8fe2acaded8dfa02452ded9ef3494e82

    • SHA512

      52dea82fb9433814624a4ec406453457f9a9f39dde436b7676590e164d068e2783673c41d7b5f99996c326cf88b7d579022fe7324d183e067305cfa33af4afb4

    • SSDEEP

      384:2I8iSsqdg1vA9Q60vA01z4+t90+r+p4/LZeSFqi:2F+1o9sYKr+pwZVEi

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks