General

  • Target

    cc036123dc65bffbe5c5650d4c02e1eb666127be1703d9a43a86d327c1fe7f3e

  • Size

    72KB

  • Sample

    240911-cz473axhjk

  • MD5

    84bbc18bb186a5ef14a21231fffe089e

  • SHA1

    4713ad0023e73735a6f3638a9702aafbff2eaaa7

  • SHA256

    cc036123dc65bffbe5c5650d4c02e1eb666127be1703d9a43a86d327c1fe7f3e

  • SHA512

    6dd82616f967ca68b83c6dc01cd13619545575bddd09b737df6cdeb78f03d596d2e1e3e83599ce901e1b4e9eeff56da56be688f0dc5002622c768b8b36a9bb0e

  • SSDEEP

    1536:I3fkF+aP1ixj4o+VZ+zyWujTUASacKORv2NXMb+KR0Nc8QsJq39:2fkEyixfkZ9caoYNXe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.100.13:4444

Targets

    • Target

      cc036123dc65bffbe5c5650d4c02e1eb666127be1703d9a43a86d327c1fe7f3e

    • Size

      72KB

    • MD5

      84bbc18bb186a5ef14a21231fffe089e

    • SHA1

      4713ad0023e73735a6f3638a9702aafbff2eaaa7

    • SHA256

      cc036123dc65bffbe5c5650d4c02e1eb666127be1703d9a43a86d327c1fe7f3e

    • SHA512

      6dd82616f967ca68b83c6dc01cd13619545575bddd09b737df6cdeb78f03d596d2e1e3e83599ce901e1b4e9eeff56da56be688f0dc5002622c768b8b36a9bb0e

    • SSDEEP

      1536:I3fkF+aP1ixj4o+VZ+zyWujTUASacKORv2NXMb+KR0Nc8QsJq39:2fkEyixfkZ9caoYNXe0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks