General

  • Target

    8187a8e84a3982d00e04cec259a5b4506d862e0906cbdf1ed7b59c2cee540e6f

  • Size

    868KB

  • Sample

    240629-dxbcmszdmb

  • MD5

    719bb71b25c1bd819639510abc60a92b

  • SHA1

    81f3a21316783783582c6575a464a925156e7d0a

  • SHA256

    8187a8e84a3982d00e04cec259a5b4506d862e0906cbdf1ed7b59c2cee540e6f

  • SHA512

    0d5406eb186ee206df9046dd5ec49dedff8fad1aa62336e2b50d188344932454ddcf7151363cb4816699771d18cda633bd0c6268899ef841de61b229ea3b27c1

  • SSDEEP

    24576:hRQS64cVvf9wxtjawHQ4gLuLZHoWix9S3:PpAk/LgUHDS9

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.204.138:1234

Targets

    • Target

      8187a8e84a3982d00e04cec259a5b4506d862e0906cbdf1ed7b59c2cee540e6f

    • Size

      868KB

    • MD5

      719bb71b25c1bd819639510abc60a92b

    • SHA1

      81f3a21316783783582c6575a464a925156e7d0a

    • SHA256

      8187a8e84a3982d00e04cec259a5b4506d862e0906cbdf1ed7b59c2cee540e6f

    • SHA512

      0d5406eb186ee206df9046dd5ec49dedff8fad1aa62336e2b50d188344932454ddcf7151363cb4816699771d18cda633bd0c6268899ef841de61b229ea3b27c1

    • SSDEEP

      24576:hRQS64cVvf9wxtjawHQ4gLuLZHoWix9S3:PpAk/LgUHDS9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks