General

  • Target

    c0057d8c45e420d1f5c3110fb0f788fdf1612c99d0a96a9e4655e0cb25592034

  • Size

    4KB

  • Sample

    240621-djt8lawhph

  • MD5

    daa1830eeab6aa032ebdea3469d37272

  • SHA1

    88b145c5ae352b4629b474b8507af837c7f92eff

  • SHA256

    c0057d8c45e420d1f5c3110fb0f788fdf1612c99d0a96a9e4655e0cb25592034

  • SHA512

    5b7634470ca1ed475cf37f6bc4e4ba309202d47d9a7ebe82311e27f2a7f496f6e8898fe9c0617f7a77b5a84b0d56c34034bce7bfd58068f31cba1d360d05cda7

  • SSDEEP

    96:SOIQAK96vbm2q/QIq2hvgNXG8McdwS/oio:/IQHwfI5IN2p3S/oD

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

127.0.0.1:4444

Targets

    • Target

      c0057d8c45e420d1f5c3110fb0f788fdf1612c99d0a96a9e4655e0cb25592034

    • Size

      4KB

    • MD5

      daa1830eeab6aa032ebdea3469d37272

    • SHA1

      88b145c5ae352b4629b474b8507af837c7f92eff

    • SHA256

      c0057d8c45e420d1f5c3110fb0f788fdf1612c99d0a96a9e4655e0cb25592034

    • SHA512

      5b7634470ca1ed475cf37f6bc4e4ba309202d47d9a7ebe82311e27f2a7f496f6e8898fe9c0617f7a77b5a84b0d56c34034bce7bfd58068f31cba1d360d05cda7

    • SSDEEP

      96:SOIQAK96vbm2q/QIq2hvgNXG8McdwS/oio:/IQHwfI5IN2p3S/oD

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks