General

  • Target

    fd422dd0e68311b7e19cd3a293e965179b158a1c305dbcc2c45fb3a52d93faed

  • Size

    102KB

  • Sample

    221125-tdpnxshf52

  • MD5

    8374956b75e95e4ae9e719de54e538d3

  • SHA1

    752828f1b064aee2919bfa39d9f22c8a44be64f2

  • SHA256

    fd422dd0e68311b7e19cd3a293e965179b158a1c305dbcc2c45fb3a52d93faed

  • SHA512

    927208d452be7211aadb1bb562bd35d72f39abcd78fa4ca231301fbdc445b3d5663395e6e1bbc7f55e9de451e21559639ec933775b4dcd05f964a285e1498bf7

  • SSDEEP

    3072:3indRzNyaLLU8m0btBI+C32ovc+CPNnSoer:yndRNhLMqq/7vqSoer

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.151.154.122:443

Targets

    • Target

      fd422dd0e68311b7e19cd3a293e965179b158a1c305dbcc2c45fb3a52d93faed

    • Size

      102KB

    • MD5

      8374956b75e95e4ae9e719de54e538d3

    • SHA1

      752828f1b064aee2919bfa39d9f22c8a44be64f2

    • SHA256

      fd422dd0e68311b7e19cd3a293e965179b158a1c305dbcc2c45fb3a52d93faed

    • SHA512

      927208d452be7211aadb1bb562bd35d72f39abcd78fa4ca231301fbdc445b3d5663395e6e1bbc7f55e9de451e21559639ec933775b4dcd05f964a285e1498bf7

    • SSDEEP

      3072:3indRzNyaLLU8m0btBI+C32ovc+CPNnSoer:yndRNhLMqq/7vqSoer

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks