General

  • Target

    51a51bd57b5c1605e1580e1a82774b301863d41633af1824500b3c146a052212

  • Size

    72KB

  • Sample

    220524-sralgsbddq

  • MD5

    8911decdba3701e627d804b25f6403c9

  • SHA1

    86f9fe55e56cf74c798bcf07adc5353b2140f66f

  • SHA256

    51a51bd57b5c1605e1580e1a82774b301863d41633af1824500b3c146a052212

  • SHA512

    2d7521c147de800569ca080468fd31114309101eb8bd3a0e33dbff06da1e0eae7c54b46f4ba25ecf95ca68a21a1e2ec4964ed2082162ea4df91489384450ffa1

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.1.196:4444

Targets

    • Target

      51a51bd57b5c1605e1580e1a82774b301863d41633af1824500b3c146a052212

    • Size

      72KB

    • MD5

      8911decdba3701e627d804b25f6403c9

    • SHA1

      86f9fe55e56cf74c798bcf07adc5353b2140f66f

    • SHA256

      51a51bd57b5c1605e1580e1a82774b301863d41633af1824500b3c146a052212

    • SHA512

      2d7521c147de800569ca080468fd31114309101eb8bd3a0e33dbff06da1e0eae7c54b46f4ba25ecf95ca68a21a1e2ec4964ed2082162ea4df91489384450ffa1

    Score
    1/10

MITRE ATT&CK Matrix

Tasks