General

  • Target

    3f5f6895742f7bbf51223c17f68c88c0757d2070277e643831cc695ff2fa719e

  • Size

    4KB

  • Sample

    240620-z9a4asxeqc

  • MD5

    4b61720eff04fd1db945901480d7b3f8

  • SHA1

    2e8e7824bd5a45bcae8275749d86851538f26030

  • SHA256

    3f5f6895742f7bbf51223c17f68c88c0757d2070277e643831cc695ff2fa719e

  • SHA512

    76fb8efe2432b4ce3ef98f96e8ea97cc7eb7307e10b543a67235927cdf45da11a6fa92c50757a557853f059e0a7eed2e3978341b0a57767669cb0031969f85c8

  • SSDEEP

    96:9WTa1MtWBh9h6+tQuYS/IYGxCv7jJIs8u/:9e1WBhmEQy/JG2z/

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

127.0.0.1:4444

Targets

    • Target

      3f5f6895742f7bbf51223c17f68c88c0757d2070277e643831cc695ff2fa719e

    • Size

      4KB

    • MD5

      4b61720eff04fd1db945901480d7b3f8

    • SHA1

      2e8e7824bd5a45bcae8275749d86851538f26030

    • SHA256

      3f5f6895742f7bbf51223c17f68c88c0757d2070277e643831cc695ff2fa719e

    • SHA512

      76fb8efe2432b4ce3ef98f96e8ea97cc7eb7307e10b543a67235927cdf45da11a6fa92c50757a557853f059e0a7eed2e3978341b0a57767669cb0031969f85c8

    • SSDEEP

      96:9WTa1MtWBh9h6+tQuYS/IYGxCv7jJIs8u/:9e1WBhmEQy/JG2z/

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks