General

  • Target

    58208d40b351d29abafbf89b8ad66e98013e921f7758f907efb75f8e615a84c8

  • Size

    5KB

  • Sample

    220523-z5c24acaem

  • MD5

    628d6dca5e9ff8f515dec35a7e289e24

  • SHA1

    3f46896c584f5cf73bfdeb310d625e20c5e4e888

  • SHA256

    58208d40b351d29abafbf89b8ad66e98013e921f7758f907efb75f8e615a84c8

  • SHA512

    14c1d63a3ca384def9837f9ca95720dec66759e13cd34112921ef5be5847540ad5913e25f83d533577833cc8c1c78e36ce04dc0ff2a4caa63382e69b10ee832a

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Targets

    • Target

      58208d40b351d29abafbf89b8ad66e98013e921f7758f907efb75f8e615a84c8

    • Size

      5KB

    • MD5

      628d6dca5e9ff8f515dec35a7e289e24

    • SHA1

      3f46896c584f5cf73bfdeb310d625e20c5e4e888

    • SHA256

      58208d40b351d29abafbf89b8ad66e98013e921f7758f907efb75f8e615a84c8

    • SHA512

      14c1d63a3ca384def9837f9ca95720dec66759e13cd34112921ef5be5847540ad5913e25f83d533577833cc8c1c78e36ce04dc0ff2a4caa63382e69b10ee832a

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks