General

  • Target

    https://adb275557dfea16195aa39a6fb174c5a.serveo.net/whiledoor.bat

  • Sample

    240508-znbgyahd89

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

147.185.221.19:47344

Targets

    • Target

      https://adb275557dfea16195aa39a6fb174c5a.serveo.net/whiledoor.bat

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks