General

  • Target

    a4b85012397f86b66c4470562268baaf7ce4c959a274a7a1bea5beee3150e597.exe.zip

  • Size

    44KB

  • Sample

    231031-rdg8qsbc67

  • MD5

    7f3064e4bc0945036f666194d9579944

  • SHA1

    1bc7f602aca0e7a2c48aaf3dbaf69b7c132155c0

  • SHA256

    98a8474bac8ea17a882b584d05685b25cb9eb4a03b6a64e537d35be12beb3d9d

  • SHA512

    8d0500a294bdfb44c4bcd44231d55003c3fd4fc7ff33ba3c0fddeacbd1c33aaf5c363fcc0b0c8a829d793c90ec8bbc5e599cab4f518f6ea682c568666caca2b6

  • SSDEEP

    768:g9Nh3HwzR1GhMh6SHTDVLrbpDe9RDozBK7ipH/tUWspek2mMM0WozFGZ+zSImJ:kD30eMhXHTRLr1D41SDfKnpRvAzFpnmJ

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

24.144.100.26:4444

Targets

    • Target

      a4b85012397f86b66c4470562268baaf7ce4c959a274a7a1bea5beee3150e597.exe

    • Size

      72KB

    • MD5

      aacae0daeae2ff4b706f0df0ad24c9fb

    • SHA1

      bd10c64c8044989ffe88eef4724586f8c4947d9a

    • SHA256

      a4b85012397f86b66c4470562268baaf7ce4c959a274a7a1bea5beee3150e597

    • SHA512

      f8ce4d1a17537fe32b121488b22cbc052eadbc3fd1669a0e7a3534406469b0c8e79ef6426ceb38287794c5eba18492bf321e3762a0835460669735e634046c86

    • SSDEEP

      1536:IWYqZc2bE/AgdQoezDM79ZUM1tK38lbG9IvCerHSMb+KR0Nc8QsJq39:c2o/ndQ/DMxZ1lbge2e0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks