General

  • Target

    ba53ac4dcac32bdb6d5a7c464e7ed970f568f486daf8b534b71669a0774634cf

  • Size

    9KB

  • Sample

    240629-j9yllatfnf

  • MD5

    a4d0dc23c241e47bd6d0553feb12ee0e

  • SHA1

    29a6fee7005c518517ae3a45bc2a08794cc5ccf2

  • SHA256

    ba53ac4dcac32bdb6d5a7c464e7ed970f568f486daf8b534b71669a0774634cf

  • SHA512

    8d026f9b3c66505e1f8e9a57643d0717e2f222e4bf1bc36c3395879e8102ada1494bc1cfe7e20fc3a2004313e9022a1d34773e041bd4c9ac5c2456f2149debea

  • SSDEEP

    48:q0kV3zU9G4aNVh7XphlhEF57/ncyACsJEoJbOE:vDIKk0sJE

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.239.128:6666

Targets

    • Target

      ba53ac4dcac32bdb6d5a7c464e7ed970f568f486daf8b534b71669a0774634cf

    • Size

      9KB

    • MD5

      a4d0dc23c241e47bd6d0553feb12ee0e

    • SHA1

      29a6fee7005c518517ae3a45bc2a08794cc5ccf2

    • SHA256

      ba53ac4dcac32bdb6d5a7c464e7ed970f568f486daf8b534b71669a0774634cf

    • SHA512

      8d026f9b3c66505e1f8e9a57643d0717e2f222e4bf1bc36c3395879e8102ada1494bc1cfe7e20fc3a2004313e9022a1d34773e041bd4c9ac5c2456f2149debea

    • SSDEEP

      48:q0kV3zU9G4aNVh7XphlhEF57/ncyACsJEoJbOE:vDIKk0sJE

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks