General

  • Target

    http://147.185.221.19:30007/cracked.bat

  • Sample

    240509-y4l3yafg29

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

147.185.221.19:48103

Targets

    • Target

      http://147.185.221.19:30007/cracked.bat

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks