General

  • Target

    b78cb2b1d378bb08d7e7bed17c166c30de3af4566835ea54b61ed9422a37ec79

  • Size

    72KB

  • Sample

    240619-cbqprswdrq

  • MD5

    f05958c4ba0ad7770b36c095fd43d104

  • SHA1

    9834cba6c66863138ac7f915b6fdd7d513e81772

  • SHA256

    b78cb2b1d378bb08d7e7bed17c166c30de3af4566835ea54b61ed9422a37ec79

  • SHA512

    d88d368dab5975906e307e9ae427ae8cd0e624cf08fe0e8f21491a48982e8bda5dec028dbb763e05895099aad95d0885d1cf917c1b9fd794c7265ff5d97f8a75

  • SSDEEP

    1536:IDyuHNizM3UW8YVwsKueCAisMb+KR0Nc8QsJq39:gyutizM3UW8wwsKprise0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_bind_tcp

Targets

    • Target

      b78cb2b1d378bb08d7e7bed17c166c30de3af4566835ea54b61ed9422a37ec79

    • Size

      72KB

    • MD5

      f05958c4ba0ad7770b36c095fd43d104

    • SHA1

      9834cba6c66863138ac7f915b6fdd7d513e81772

    • SHA256

      b78cb2b1d378bb08d7e7bed17c166c30de3af4566835ea54b61ed9422a37ec79

    • SHA512

      d88d368dab5975906e307e9ae427ae8cd0e624cf08fe0e8f21491a48982e8bda5dec028dbb763e05895099aad95d0885d1cf917c1b9fd794c7265ff5d97f8a75

    • SSDEEP

      1536:IDyuHNizM3UW8YVwsKueCAisMb+KR0Nc8QsJq39:gyutizM3UW8wwsKprise0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks