General

  • Target

    ece3b8c6c362f7f51e2a0409e7434fabc8331d8a0883981dc7d19b420553ea8d

  • Size

    773KB

  • Sample

    240424-vsm93sdg49

  • MD5

    8875e9f3c36ad27c5685895ada345fe2

  • SHA1

    5bac5cd79a76d27d0bf15978b4f593fa1f333899

  • SHA256

    ece3b8c6c362f7f51e2a0409e7434fabc8331d8a0883981dc7d19b420553ea8d

  • SHA512

    5a5d417d176f97ae4dd744890106e8bf0f82f4cb1047f9f64b50bc70e0732ee66e5f7791a6d2143b07a8da0e6b267efb553f04d84936579c7c9597546328863b

  • SSDEEP

    12288:jrgYSIPXFoqx+QLNaPmlkje+kjOf1lyJFG:hFbsQLomlee+kjUia

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.129.128:6547

Targets

    • Target

      ece3b8c6c362f7f51e2a0409e7434fabc8331d8a0883981dc7d19b420553ea8d

    • Size

      773KB

    • MD5

      8875e9f3c36ad27c5685895ada345fe2

    • SHA1

      5bac5cd79a76d27d0bf15978b4f593fa1f333899

    • SHA256

      ece3b8c6c362f7f51e2a0409e7434fabc8331d8a0883981dc7d19b420553ea8d

    • SHA512

      5a5d417d176f97ae4dd744890106e8bf0f82f4cb1047f9f64b50bc70e0732ee66e5f7791a6d2143b07a8da0e6b267efb553f04d84936579c7c9597546328863b

    • SSDEEP

      12288:jrgYSIPXFoqx+QLNaPmlkje+kjOf1lyJFG:hFbsQLomlee+kjUia

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks