General

  • Target

    https://drive.google.com/file/d/1YNsJ_GhMBhGJkw4BzpfOCNbyRV_szpTC/view?usp=sharing

  • Sample

    230722-vl959sbe92

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.15.176:80

Targets

    • Target

      https://drive.google.com/file/d/1YNsJ_GhMBhGJkw4BzpfOCNbyRV_szpTC/view?usp=sharing

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks