General

  • Target

    418d0f01eac7f7dc92e4b4397b867f9b04c319951a55f373895992dcde2b98baN

  • Size

    320KB

  • Sample

    240917-fqmhfawbpc

  • MD5

    e082ebd1fb234769a6c85b2b55cdae80

  • SHA1

    82393e6b4e3c6c4694f23631c9e2e546e5910191

  • SHA256

    418d0f01eac7f7dc92e4b4397b867f9b04c319951a55f373895992dcde2b98ba

  • SHA512

    5d4429ae2d8fe30f0ce1b2e2b193fa3a30d049b349640f9781615e5ad2875625aefd5c7295221750a6a2bddf83e37fff2591d9d51f38c1a792613be9b3b1cf71

  • SSDEEP

    6144:18KM9fEZ76J7vUtk/oFB2Yf5mrEEr9O5zfpYnVfTOJqSyO7C:1c9iArUGoFnf5YEkOxvyO

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

92.253.102.95:443

Targets

    • Target

      418d0f01eac7f7dc92e4b4397b867f9b04c319951a55f373895992dcde2b98baN

    • Size

      320KB

    • MD5

      e082ebd1fb234769a6c85b2b55cdae80

    • SHA1

      82393e6b4e3c6c4694f23631c9e2e546e5910191

    • SHA256

      418d0f01eac7f7dc92e4b4397b867f9b04c319951a55f373895992dcde2b98ba

    • SHA512

      5d4429ae2d8fe30f0ce1b2e2b193fa3a30d049b349640f9781615e5ad2875625aefd5c7295221750a6a2bddf83e37fff2591d9d51f38c1a792613be9b3b1cf71

    • SSDEEP

      6144:18KM9fEZ76J7vUtk/oFB2Yf5mrEEr9O5zfpYnVfTOJqSyO7C:1c9iArUGoFnf5YEkOxvyO

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks