General

  • Target

    860792c5fa0883c6a814569c5854dfcfc75d809c9e8ecf3a3f8739e8c60325dd

  • Size

    743KB

  • Sample

    240509-3sksysea8w

  • MD5

    8e762a019dff11129354600d1a6c11e6

  • SHA1

    51fb8d04a6add417685db5280345c4ef429ebfd4

  • SHA256

    860792c5fa0883c6a814569c5854dfcfc75d809c9e8ecf3a3f8739e8c60325dd

  • SHA512

    8db9fc3bdf0590c0320afc44efe3ec494954ecd8993c51c971b05b1ae999ede2ac8b23af7346321e1ecbca9136fcda8d151073adea967de218fbcb1ba8531560

  • SSDEEP

    12288:HIBPdteSSFv+RoBHTrMm92AxIc/FeKwzWzP039A8JuRo4hU8NGjjg9MdvKwndgg5:Hmlte7v+69HMmIATeK0UkifUCyj9Pf

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.1.128:1234

Targets

    • Target

      860792c5fa0883c6a814569c5854dfcfc75d809c9e8ecf3a3f8739e8c60325dd

    • Size

      743KB

    • MD5

      8e762a019dff11129354600d1a6c11e6

    • SHA1

      51fb8d04a6add417685db5280345c4ef429ebfd4

    • SHA256

      860792c5fa0883c6a814569c5854dfcfc75d809c9e8ecf3a3f8739e8c60325dd

    • SHA512

      8db9fc3bdf0590c0320afc44efe3ec494954ecd8993c51c971b05b1ae999ede2ac8b23af7346321e1ecbca9136fcda8d151073adea967de218fbcb1ba8531560

    • SSDEEP

      12288:HIBPdteSSFv+RoBHTrMm92AxIc/FeKwzWzP039A8JuRo4hU8NGjjg9MdvKwndgg5:Hmlte7v+69HMmIATeK0UkifUCyj9Pf

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks