General

  • Target

    8a06be0950c6ad9b7fac56caaf23fff8092eadcbb7f894dcdea17fe12a357e0b

  • Size

    43KB

  • Sample

    240419-vwvtbsbc3s

  • MD5

    d6fd9767dcb78ef3046411b300020c04

  • SHA1

    4ca5f6f9c88264725fbe667107ee1fecf034b061

  • SHA256

    8a06be0950c6ad9b7fac56caaf23fff8092eadcbb7f894dcdea17fe12a357e0b

  • SHA512

    60063880509002787509b52f6461574582470b9ff6f9b3c10cd2d4443d74978f0b07e64e169f1d6f6c06f1e73e13d6db35220d508429ab220c34fa71239feaca

  • SSDEEP

    768:9/i8QQ1JLGugBwmzOx19kNzr0pa3BDOsa6fsOVEeY3MZZ9s7gf2:9/9QGLBgSmzi1GNzrZ+3eYaZ9sUf2

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

91.92.251.119:4444

Targets

    • Target

      5cad07e8a93e151126f2668e4acd40bfb6a6c136720868e1abb88d6ce855488b.exe

    • Size

      72KB

    • MD5

      039aebb1a469963963e34d31a42e6608

    • SHA1

      6a60e11aa5949ab9fd861397879e2b6649292e2b

    • SHA256

      5cad07e8a93e151126f2668e4acd40bfb6a6c136720868e1abb88d6ce855488b

    • SHA512

      37ce7dff742d3a9680574c96012c81fcbb3aa94435c7aeb4691f1a6fa9e9e8009e63b4d3d126302fbeab13adf453b045fd5c2dcfd4ca7d24b20f90e4e4e386a0

    • SSDEEP

      1536:Ia6vKe2IO6a0lRL82nTnWVMb+KR0Nc8QsJq39:W1xL5ue0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks