General

  • Target

    111

  • Size

    72KB

  • Sample

    240619-kdbmmaxcqh

  • MD5

    5d8cf3292e8e28100155e36b34375c04

  • SHA1

    9a940d55a17be67b4cd730abef89fd1145828dab

  • SHA256

    231f06a5a73dc84dd285ebe9588e7031d5bcec28d65d2ab4cde6a23c5f383cfa

  • SHA512

    9345d99b3fd6452679bf5fb007967970cf1f3adf33edaddda6ebd24c37f495177ac8cceae4e5b95831276afca937377bdaf78cde6e2b91a6e724b3c45a8cd62e

  • SSDEEP

    1536:IpVGdwgFw6TUFQBW4q/T9NPXMb+KR0Nc8QsJq39:YJgFhmQBW4q/T9N/e0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.1.33:4444

Targets

    • Target

      111

    • Size

      72KB

    • MD5

      5d8cf3292e8e28100155e36b34375c04

    • SHA1

      9a940d55a17be67b4cd730abef89fd1145828dab

    • SHA256

      231f06a5a73dc84dd285ebe9588e7031d5bcec28d65d2ab4cde6a23c5f383cfa

    • SHA512

      9345d99b3fd6452679bf5fb007967970cf1f3adf33edaddda6ebd24c37f495177ac8cceae4e5b95831276afca937377bdaf78cde6e2b91a6e724b3c45a8cd62e

    • SSDEEP

      1536:IpVGdwgFw6TUFQBW4q/T9NPXMb+KR0Nc8QsJq39:YJgFhmQBW4q/T9N/e0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks