General

  • Target

    ed4dad293318b49b17cc38a38bb6148e.exe

  • Size

    48KB

  • Sample

    240109-xl7fgsgfak

  • MD5

    ed4dad293318b49b17cc38a38bb6148e

  • SHA1

    bf63ac2a43b4cf2cd6abc4e1f264141861e18239

  • SHA256

    92b01fa99e634a32d65d86d5c7753cf15737b76cb6af09d6ef1cd841ab73c4aa

  • SHA512

    1fdfac09b4bf5dc902e06920e08973ab97ce98fc8f5ae98f7a7f2f3f6fc79c423c77bdfb0a251855cbfe76a13facf999d12d0266495da43e681f777551223e44

  • SSDEEP

    384:RoyWYkyOiuRqskMJyYbUUCSz0QtngVQh+Ynys6KbF9thjN5XojgeDT1nN7ShtNc0:vGRqsk/utnHhtnys3zthN50xnlYPV3

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.1.14:4444

Targets

    • Target

      ed4dad293318b49b17cc38a38bb6148e.exe

    • Size

      48KB

    • MD5

      ed4dad293318b49b17cc38a38bb6148e

    • SHA1

      bf63ac2a43b4cf2cd6abc4e1f264141861e18239

    • SHA256

      92b01fa99e634a32d65d86d5c7753cf15737b76cb6af09d6ef1cd841ab73c4aa

    • SHA512

      1fdfac09b4bf5dc902e06920e08973ab97ce98fc8f5ae98f7a7f2f3f6fc79c423c77bdfb0a251855cbfe76a13facf999d12d0266495da43e681f777551223e44

    • SSDEEP

      384:RoyWYkyOiuRqskMJyYbUUCSz0QtngVQh+Ynys6KbF9thjN5XojgeDT1nN7ShtNc0:vGRqsk/utnHhtnys3zthN50xnlYPV3

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks