General

  • Target

    injector.exe

  • Size

    17KB

  • Sample

    240430-vqmkrsbc9x

  • MD5

    b28e5c6032fd48230965690e0ad17b45

  • SHA1

    2383afc699375dac9578fb77cedb68ea6cb78136

  • SHA256

    8cdcf2477c21f37447b5c862e79def1df2d6e7ad8d18e6c91c2f67134a8353cb

  • SHA512

    05f07b7c062a5eca134ff6c8d1dc8fbba9412dcdca64c8fcc69cd69aa575acc411000f5aa33f2782087107b1793efb76b0de553d9b3acce97a26303da4844371

  • SSDEEP

    384:rjcjwcOkjc5lPvL/c1fcoj8cCL1IDcU2PCcmL6nmhlkX3JMM7Gzq:rjcjwc1jc5B/c1fcoj8cCW6PCcfmAX3z

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.88.128:9090

Targets

    • Target

      injector.exe

    • Size

      17KB

    • MD5

      b28e5c6032fd48230965690e0ad17b45

    • SHA1

      2383afc699375dac9578fb77cedb68ea6cb78136

    • SHA256

      8cdcf2477c21f37447b5c862e79def1df2d6e7ad8d18e6c91c2f67134a8353cb

    • SHA512

      05f07b7c062a5eca134ff6c8d1dc8fbba9412dcdca64c8fcc69cd69aa575acc411000f5aa33f2782087107b1793efb76b0de553d9b3acce97a26303da4844371

    • SSDEEP

      384:rjcjwcOkjc5lPvL/c1fcoj8cCL1IDcU2PCcmL6nmhlkX3JMM7Gzq:rjcjwc1jc5B/c1fcoj8cCW6PCcfmAX3z

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks