General

  • Target

    nigger.exe

  • Size

    17KB

  • Sample

    240501-adedeada75

  • MD5

    0e90a35ee68f8145cc2e462ead20a986

  • SHA1

    523b0b69ba6b648b73e2be445a4727495b853616

  • SHA256

    b19b8f316e186672a30f77299bc26039916efffe7df5fd27d9e1eb5da4c786de

  • SHA512

    dda1530b20e365ca5ddcbf982aa674b01e3a002f368bb53c96b05eea9896c1e776edcf5bd33a387c26b6bdcf63cae83fe881e12b8a181bd824809c701cd0fa5c

  • SSDEEP

    384:0EEoLO56ayzcMj+cECNvnKw3WwRcYOINeKRnfTPL+r:3E8O56lcVgwwRcXINe0fTPL+r

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.88.128:3333

Targets

    • Target

      nigger.exe

    • Size

      17KB

    • MD5

      0e90a35ee68f8145cc2e462ead20a986

    • SHA1

      523b0b69ba6b648b73e2be445a4727495b853616

    • SHA256

      b19b8f316e186672a30f77299bc26039916efffe7df5fd27d9e1eb5da4c786de

    • SHA512

      dda1530b20e365ca5ddcbf982aa674b01e3a002f368bb53c96b05eea9896c1e776edcf5bd33a387c26b6bdcf63cae83fe881e12b8a181bd824809c701cd0fa5c

    • SSDEEP

      384:0EEoLO56ayzcMj+cECNvnKw3WwRcYOINeKRnfTPL+r:3E8O56lcVgwwRcXINe0fTPL+r

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks