General

  • Target

    scenario2-traffic-capture.pcap

  • Size

    4.6MB

  • Sample

    230313-qw96sscf4y

  • MD5

    8b49c76c8f758b394ebe94a242617da9

  • SHA1

    0a505192a952f17259cb5bdbd595e6ce0c4a63fa

  • SHA256

    1fe44854416989533fde54848fdb764afb5c4e08ec25d8da4b26f003de1385a6

  • SHA512

    f4f1cd8a4110957fb11a9d850c43b426f81f6f501d339f7dfadcb37f778e718212407d42b3a50772f3fd0ae13acba0f4e8849c0278181de7941181efb6e21aec

  • SSDEEP

    49152:nBC1E8vBbZmUVTl3qGJdrLlWq2d+hhwbioE4nlXCAR6fHJsxMLzbkNlWwQR5k4kh:KZNZBH+o8NYk/YrUZMYN2Gd

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.220.66:4444

Targets

    • Target

      scenario2-traffic-capture.pcap

    • Size

      4.6MB

    • MD5

      8b49c76c8f758b394ebe94a242617da9

    • SHA1

      0a505192a952f17259cb5bdbd595e6ce0c4a63fa

    • SHA256

      1fe44854416989533fde54848fdb764afb5c4e08ec25d8da4b26f003de1385a6

    • SHA512

      f4f1cd8a4110957fb11a9d850c43b426f81f6f501d339f7dfadcb37f778e718212407d42b3a50772f3fd0ae13acba0f4e8849c0278181de7941181efb6e21aec

    • SSDEEP

      49152:nBC1E8vBbZmUVTl3qGJdrLlWq2d+hhwbioE4nlXCAR6fHJsxMLzbkNlWwQR5k4kh:KZNZBH+o8NYk/YrUZMYN2Gd

    Score
    3/10

MITRE ATT&CK Enterprise v6

Tasks