General

  • Target

    final.pdf

  • Size

    144KB

  • Sample

    240917-b86ltazcpp

  • MD5

    00e569b09c3095e042896d462fb44c53

  • SHA1

    e1e96b016decda01a59dcdbf55022875d5efed7e

  • SHA256

    8f724ffc83c133d4258beaeb667d02fe8c9ce5475fb1e3cfb2103581c3bfa1f5

  • SHA512

    64e68a94494c58cdc8c48ba4d12ba76d742ecc6c2ef8c2eb273b62219652625cc5e6bdd4b3ea075201806456c4fe31b242b5aa66a8cd682417f6eace904a82c4

  • SSDEEP

    3072:EaD7eFimTKEIm0Op+Ib2kPaMe0Nc8QsCp2JoxDBqrqVBye0Nc8QsC9:NlmT3fpf1PU0Nc8Qs7JCArqVH0Nc8Qss

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.1.100:4444

Targets

    • Target

      final.pdf

    • Size

      144KB

    • MD5

      00e569b09c3095e042896d462fb44c53

    • SHA1

      e1e96b016decda01a59dcdbf55022875d5efed7e

    • SHA256

      8f724ffc83c133d4258beaeb667d02fe8c9ce5475fb1e3cfb2103581c3bfa1f5

    • SHA512

      64e68a94494c58cdc8c48ba4d12ba76d742ecc6c2ef8c2eb273b62219652625cc5e6bdd4b3ea075201806456c4fe31b242b5aa66a8cd682417f6eace904a82c4

    • SSDEEP

      3072:EaD7eFimTKEIm0Op+Ib2kPaMe0Nc8QsCp2JoxDBqrqVBye0Nc8QsC9:NlmT3fpf1PU0Nc8Qs7JCArqVH0Nc8Qss

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks