General

  • Target

    01f7ece6385f9b637da90e7e67f4d5f62936b71d306bd0e1ddab146bc7844fbc

  • Size

    773KB

  • Sample

    240424-smzptacb93

  • MD5

    c35d8b28daa07437a90216a73d1f9443

  • SHA1

    88e421fd0cc9916507732e2b02de116e5d650eec

  • SHA256

    01f7ece6385f9b637da90e7e67f4d5f62936b71d306bd0e1ddab146bc7844fbc

  • SHA512

    d154dc932b246da8574e0b31580e5d7a286ab3a815a3935a72ec665fff5f3263beb73ceae4f66fe12cfe313cf0cb2e8cf05d56a25790f217d1312adb03a02f8c

  • SSDEEP

    12288:EErJ5sTH1PNuc+QLNaPmlkje+kjOf1lyJFG:ESfsTdNYQLomlee+kjUia

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.248.128:5656

Targets

    • Target

      01f7ece6385f9b637da90e7e67f4d5f62936b71d306bd0e1ddab146bc7844fbc

    • Size

      773KB

    • MD5

      c35d8b28daa07437a90216a73d1f9443

    • SHA1

      88e421fd0cc9916507732e2b02de116e5d650eec

    • SHA256

      01f7ece6385f9b637da90e7e67f4d5f62936b71d306bd0e1ddab146bc7844fbc

    • SHA512

      d154dc932b246da8574e0b31580e5d7a286ab3a815a3935a72ec665fff5f3263beb73ceae4f66fe12cfe313cf0cb2e8cf05d56a25790f217d1312adb03a02f8c

    • SSDEEP

      12288:EErJ5sTH1PNuc+QLNaPmlkje+kjOf1lyJFG:ESfsTdNYQLomlee+kjUia

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks