General

  • Target

    UniKeyNT.exe

  • Size

    2.0MB

  • Sample

    240917-q66lcswgqm

  • MD5

    a29706db4a546c74a1f9df9a68902999

  • SHA1

    241f65ec00a35ad6baad99284d9638f20500a58a

  • SHA256

    91cf732bf2dde5504486a8b067c36e4849aaeb56491880e20d59fac6e739a7db

  • SHA512

    cbce785de83ca25917daffa495486fd490b20b8a1b362e02fdd96128b32f3bf95be5819d899ca0daf36be3599e32eb583d76ee3a536f6bacbbb8dd33b15e006e

  • SSDEEP

    24576:2U5PgkAjdF7j8UcKAtsy50hOksvkpbsvPb+Qeah5Z3SHa:FF+7j8UcKAh5JksvkpbCiQeahjSHa

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.1.72:4444

Targets

    • Target

      UniKeyNT.exe

    • Size

      2.0MB

    • MD5

      a29706db4a546c74a1f9df9a68902999

    • SHA1

      241f65ec00a35ad6baad99284d9638f20500a58a

    • SHA256

      91cf732bf2dde5504486a8b067c36e4849aaeb56491880e20d59fac6e739a7db

    • SHA512

      cbce785de83ca25917daffa495486fd490b20b8a1b362e02fdd96128b32f3bf95be5819d899ca0daf36be3599e32eb583d76ee3a536f6bacbbb8dd33b15e006e

    • SSDEEP

      24576:2U5PgkAjdF7j8UcKAtsy50hOksvkpbsvPb+Qeah5Z3SHa:FF+7j8UcKAh5JksvkpbCiQeahjSHa

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks