General

  • Target

    f91dc9c9ea3647012ff2b218237ca8b8a722b8f9c752dd74e4968d4154d6f8ff

  • Size

    486KB

  • Sample

    221127-xjggaaef6w

  • MD5

    58f225226e709ce3bf867d59e8be4820

  • SHA1

    d88107d42968e2441368eea84286a587ad8f1fdb

  • SHA256

    f91dc9c9ea3647012ff2b218237ca8b8a722b8f9c752dd74e4968d4154d6f8ff

  • SHA512

    5b22a2d144ca83434ba0ea9e88d198a3cd344a95e9275c85f356f9e075556af6b95ae46585ed91c436d7ae21ab6afe0f4447edfe2d1758ef53e2decc37fe0d3e

  • SSDEEP

    12288:jFJs3XraGmcmd/26o9juQ+pDQZPpWubrG/+9P/9YYbTH:jjs3XFxxpJ+pDKR9nKoTH

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

8.8.8.8:443

Targets

    • Target

      f91dc9c9ea3647012ff2b218237ca8b8a722b8f9c752dd74e4968d4154d6f8ff

    • Size

      486KB

    • MD5

      58f225226e709ce3bf867d59e8be4820

    • SHA1

      d88107d42968e2441368eea84286a587ad8f1fdb

    • SHA256

      f91dc9c9ea3647012ff2b218237ca8b8a722b8f9c752dd74e4968d4154d6f8ff

    • SHA512

      5b22a2d144ca83434ba0ea9e88d198a3cd344a95e9275c85f356f9e075556af6b95ae46585ed91c436d7ae21ab6afe0f4447edfe2d1758ef53e2decc37fe0d3e

    • SSDEEP

      12288:jFJs3XraGmcmd/26o9juQ+pDQZPpWubrG/+9P/9YYbTH:jjs3XFxxpJ+pDKR9nKoTH

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks