General

  • Target

    4e0d757c3f8d64f78048fe8bd13041f7192b60a0aa9b6fd4d1196d9adb765f92.bin.exe

  • Size

    589KB

  • Sample

    240518-nf4yqsgh62

  • MD5

    2e96b824c62be7ea7f4d9f5659b3d555

  • SHA1

    6aa383750400dae2adf590548e13cd5ff77e0467

  • SHA256

    4e0d757c3f8d64f78048fe8bd13041f7192b60a0aa9b6fd4d1196d9adb765f92

  • SHA512

    5afde4b373d2f211692b2187a3522ac8a82848a3f7c2caa78c6e947a0f366c6061190e6e19b1ac6ebdcd23ad1e5547eaf7c13ab4db7ac9db80e585e08b4bc80e

  • SSDEEP

    3072:yO2KddQGiev+bBUDX0/EWzn6SmcX6W+r5zPxKOOmT2fMrDwO5srkUd1R1QxS:12bG3+tls0/mI6jg/M5529PR1H

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.1.150:8888

Targets

    • Target

      4e0d757c3f8d64f78048fe8bd13041f7192b60a0aa9b6fd4d1196d9adb765f92.bin.exe

    • Size

      589KB

    • MD5

      2e96b824c62be7ea7f4d9f5659b3d555

    • SHA1

      6aa383750400dae2adf590548e13cd5ff77e0467

    • SHA256

      4e0d757c3f8d64f78048fe8bd13041f7192b60a0aa9b6fd4d1196d9adb765f92

    • SHA512

      5afde4b373d2f211692b2187a3522ac8a82848a3f7c2caa78c6e947a0f366c6061190e6e19b1ac6ebdcd23ad1e5547eaf7c13ab4db7ac9db80e585e08b4bc80e

    • SSDEEP

      3072:yO2KddQGiev+bBUDX0/EWzn6SmcX6W+r5zPxKOOmT2fMrDwO5srkUd1R1QxS:12bG3+tls0/mI6jg/M5529PR1H

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks