General
-
Target
http://147.185.221.19:30007/fatrat.bat
-
Sample
240509-gqkvaade9w
Score
10/10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://147.185.221.19:30007/fatrat.bat
Resource
win10v2004-20240426-en
windows10-2004-x64
10 signatures
1800 seconds
Malware Config
Extracted
Family
metasploit
Version
encoder/shikata_ga_nai
Extracted
Family
metasploit
Version
windows/reverse_tcp
C2
147.185.221.19:47344
Targets
-
-
Target
http://147.185.221.19:30007/fatrat.bat
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Blocklisted process makes network request
-