General

  • Target

    c14199ea82a4343bc050e5ec8fef4fa51ee3002f67b6b4bbf533b923a2448771

  • Size

    4KB

  • Sample

    240602-cq22cafe4y

  • MD5

    699512a81a0039d3197306a0f2111adb

  • SHA1

    1bfb31ae0e93bdc71b20ed79b71c8022e92459e4

  • SHA256

    c14199ea82a4343bc050e5ec8fef4fa51ee3002f67b6b4bbf533b923a2448771

  • SHA512

    818047c78834d4d8d74d1511eca933a34852cccf1909127405e131632e315eff85f0b5be989a3121708f69153aea600c9bcf3c2d34031ea063d5b6d32cb0b99c

  • SSDEEP

    96:nNlMceAfNAC5KphOIKN6N0fR87Opulltkb1o3m:/M6fLQzKjfR8yKlmbG3m

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.0.159:4444

Targets

    • Target

      c14199ea82a4343bc050e5ec8fef4fa51ee3002f67b6b4bbf533b923a2448771

    • Size

      4KB

    • MD5

      699512a81a0039d3197306a0f2111adb

    • SHA1

      1bfb31ae0e93bdc71b20ed79b71c8022e92459e4

    • SHA256

      c14199ea82a4343bc050e5ec8fef4fa51ee3002f67b6b4bbf533b923a2448771

    • SHA512

      818047c78834d4d8d74d1511eca933a34852cccf1909127405e131632e315eff85f0b5be989a3121708f69153aea600c9bcf3c2d34031ea063d5b6d32cb0b99c

    • SSDEEP

      96:nNlMceAfNAC5KphOIKN6N0fR87Opulltkb1o3m:/M6fLQzKjfR8yKlmbG3m

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks