General

  • Target

    6b3088d32c8bffbce7e63247a47da587ca4de1e2fc87d62862672eb2640573fe

  • Size

    4KB

  • Sample

    240620-24849awdln

  • MD5

    39c2a40ccb8de007942b403654a5f27a

  • SHA1

    39b960000f703d1ddf44961dd0db2917a3c74b0f

  • SHA256

    6b3088d32c8bffbce7e63247a47da587ca4de1e2fc87d62862672eb2640573fe

  • SHA512

    cd72029d983c8d2b29fb32b4d49874fafcec255ba988976632004b14b2a1aabf4203a60052f8c1324003341006ceb34e323b19febfa82e863368efc4a305da9c

  • SSDEEP

    48:6yiMdsWAG4887qbvOZ6ELsrQ15Qm9eX5F4IKFhhUp2xv0ucmABs:fTsWAG4887qbeLs015i5F4dFw2mX16

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

127.0.0.1:4444

Targets

    • Target

      6b3088d32c8bffbce7e63247a47da587ca4de1e2fc87d62862672eb2640573fe

    • Size

      4KB

    • MD5

      39c2a40ccb8de007942b403654a5f27a

    • SHA1

      39b960000f703d1ddf44961dd0db2917a3c74b0f

    • SHA256

      6b3088d32c8bffbce7e63247a47da587ca4de1e2fc87d62862672eb2640573fe

    • SHA512

      cd72029d983c8d2b29fb32b4d49874fafcec255ba988976632004b14b2a1aabf4203a60052f8c1324003341006ceb34e323b19febfa82e863368efc4a305da9c

    • SSDEEP

      48:6yiMdsWAG4887qbvOZ6ELsrQ15Qm9eX5F4IKFhhUp2xv0ucmABs:fTsWAG4887qbeLs015i5F4dFw2mX16

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks