General

  • Target

    b3e84849ffabbc99bfbf6158c75499b6ab65604f82b97d903f696e4b55ba1d52

  • Size

    217KB

  • Sample

    221130-2zmqfsch27

  • MD5

    bfba50b097fe03614f5dbf25af42e8ee

  • SHA1

    620ec8316dc5712da04df439142b745a854de544

  • SHA256

    b3e84849ffabbc99bfbf6158c75499b6ab65604f82b97d903f696e4b55ba1d52

  • SHA512

    9491b7ca6f28780d24ca97cd8a77d0b0bd3d31afb50c7835c87b85cc3d27d797fe44455fe6a6dbb47605b3f2477848bf829338cea2fbac40f788066c7f3b15a5

  • SSDEEP

    6144:rke5lTl+F2HpEHx0zTD/rUom0+XLT3rqB8fI:rd5xlzpE6PmZ3c

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.0.10:123

Targets

    • Target

      b3e84849ffabbc99bfbf6158c75499b6ab65604f82b97d903f696e4b55ba1d52

    • Size

      217KB

    • MD5

      bfba50b097fe03614f5dbf25af42e8ee

    • SHA1

      620ec8316dc5712da04df439142b745a854de544

    • SHA256

      b3e84849ffabbc99bfbf6158c75499b6ab65604f82b97d903f696e4b55ba1d52

    • SHA512

      9491b7ca6f28780d24ca97cd8a77d0b0bd3d31afb50c7835c87b85cc3d27d797fe44455fe6a6dbb47605b3f2477848bf829338cea2fbac40f788066c7f3b15a5

    • SSDEEP

      6144:rke5lTl+F2HpEHx0zTD/rUom0+XLT3rqB8fI:rd5xlzpE6PmZ3c

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks