General

  • Target

    Binary.Payload

  • Size

    124KB

  • Sample

    240916-xyek8svfjd

  • MD5

    320d510d710bfa72ee8211febcd89e7d

  • SHA1

    97e4864038af327b6a63063e735d1b51c1d9234e

  • SHA256

    98a99b11569bb7c1349c50d201f9d0caba40647a70c82797351bde62e17d747e

  • SHA512

    ed35fe633958851ee26e96d3c87280303330a2d51a9a56a188b7f407a1ce1ef95a1cfaf5d52e09d6a662fc27f3c8eede9f64ed653ef992b3e7285db2d821f165

  • SSDEEP

    1536:IBHVA41gMBKopUqltN4iNvjY4XNfz63dMb+KR0Nc8QsJq3:2GfGKaU0zvjYyNgde0Nc8QsC

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.1.12:445

Targets

    • Target

      Binary.Payload

    • Size

      124KB

    • MD5

      320d510d710bfa72ee8211febcd89e7d

    • SHA1

      97e4864038af327b6a63063e735d1b51c1d9234e

    • SHA256

      98a99b11569bb7c1349c50d201f9d0caba40647a70c82797351bde62e17d747e

    • SHA512

      ed35fe633958851ee26e96d3c87280303330a2d51a9a56a188b7f407a1ce1ef95a1cfaf5d52e09d6a662fc27f3c8eede9f64ed653ef992b3e7285db2d821f165

    • SSDEEP

      1536:IBHVA41gMBKopUqltN4iNvjY4XNfz63dMb+KR0Nc8QsJq3:2GfGKaU0zvjYyNgde0Nc8QsC

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks