General

  • Target

    cae31789a385572ddaede55a017d7169a8c1612dcdcd7929c074b6d9b88bb710

  • Size

    217KB

  • Sample

    221201-v8wamacd98

  • MD5

    da578c735608d05954898098d8723c93

  • SHA1

    c614f9cb303cf5ceeb47ba354c320c4447d3764c

  • SHA256

    cae31789a385572ddaede55a017d7169a8c1612dcdcd7929c074b6d9b88bb710

  • SHA512

    20d98de9d91f0ba3dbb850d5c3df1678519ee5ebaa9fe4e18e656aa58719abf071e60f42a81d166a8bb1aa173fbda801aed0353ca424c3d0d54bf0ef392bac2c

  • SSDEEP

    6144:95C6mMtOFnxPVWYDFYukiKs72GP88OGpEJpnCAW:vC6mMtoPPhYij7UUpEJpntW

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

10.0.0.130:443

Targets

    • Target

      cae31789a385572ddaede55a017d7169a8c1612dcdcd7929c074b6d9b88bb710

    • Size

      217KB

    • MD5

      da578c735608d05954898098d8723c93

    • SHA1

      c614f9cb303cf5ceeb47ba354c320c4447d3764c

    • SHA256

      cae31789a385572ddaede55a017d7169a8c1612dcdcd7929c074b6d9b88bb710

    • SHA512

      20d98de9d91f0ba3dbb850d5c3df1678519ee5ebaa9fe4e18e656aa58719abf071e60f42a81d166a8bb1aa173fbda801aed0353ca424c3d0d54bf0ef392bac2c

    • SSDEEP

      6144:95C6mMtOFnxPVWYDFYukiKs72GP88OGpEJpnCAW:vC6mMtoPPhYij7UUpEJpntW

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks