General

  • Target

    f5078f51c01d4cc8ae38db42ee89c458bd88b122c422d87d51b287dcb94c5322

  • Size

    72KB

  • Sample

    240615-ed2wxsybkf

  • MD5

    7337bc5fd4f6ddf53a26276122cb8d3a

  • SHA1

    f3ff92c208dd0ca45b86b6cb426ae3a41f05741d

  • SHA256

    f5078f51c01d4cc8ae38db42ee89c458bd88b122c422d87d51b287dcb94c5322

  • SHA512

    806f2a50c2f4cf54ceceb7eb5be47e808a88bee9d34b5a306e1214849a06000e69e4ca02682e09151ec45054bbf92c0213f01dae94c27ef5f48702a143e9671d

  • SSDEEP

    1536:Isp+KIx9d+5GjYLTMGUaSt4Bvt6urZc7Mb+KR0Nc8QsJq39:ffIx9d+M0LJpDm7e0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

172.26.0.152:4444

Targets

    • Target

      f5078f51c01d4cc8ae38db42ee89c458bd88b122c422d87d51b287dcb94c5322

    • Size

      72KB

    • MD5

      7337bc5fd4f6ddf53a26276122cb8d3a

    • SHA1

      f3ff92c208dd0ca45b86b6cb426ae3a41f05741d

    • SHA256

      f5078f51c01d4cc8ae38db42ee89c458bd88b122c422d87d51b287dcb94c5322

    • SHA512

      806f2a50c2f4cf54ceceb7eb5be47e808a88bee9d34b5a306e1214849a06000e69e4ca02682e09151ec45054bbf92c0213f01dae94c27ef5f48702a143e9671d

    • SSDEEP

      1536:Isp+KIx9d+5GjYLTMGUaSt4Bvt6urZc7Mb+KR0Nc8QsJq39:ffIx9d+M0LJpDm7e0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks