General

  • Target

    c4240aff9825d33bc05f6d7199def3602da2df8c3600e7c642bc25464f46510d

  • Size

    42KB

  • Sample

    240918-lde6gsthjl

  • MD5

    0c0f7323c35ece5a6643d35d85e5cb43

  • SHA1

    e8f861669ca4c421c540be81a0ae8e9cc4dd9fd0

  • SHA256

    c4240aff9825d33bc05f6d7199def3602da2df8c3600e7c642bc25464f46510d

  • SHA512

    d8735d0a1d54e91e59b8e6045d8be87fc55c8362fadccbd9103c5be2680a26098e94b01c6faf05c8172b99a220d7e7a8e7170a05bc16270f27e2fd510ed8b297

  • SSDEEP

    384:MEHfFCjt8RcCwvvSA7wlVCWvHisVG+CVlk4Md9NiRh:Mgtm8RcCs64w2WvHO+AlkDN4h

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.9.131:3333

Targets

    • Target

      c4240aff9825d33bc05f6d7199def3602da2df8c3600e7c642bc25464f46510d

    • Size

      42KB

    • MD5

      0c0f7323c35ece5a6643d35d85e5cb43

    • SHA1

      e8f861669ca4c421c540be81a0ae8e9cc4dd9fd0

    • SHA256

      c4240aff9825d33bc05f6d7199def3602da2df8c3600e7c642bc25464f46510d

    • SHA512

      d8735d0a1d54e91e59b8e6045d8be87fc55c8362fadccbd9103c5be2680a26098e94b01c6faf05c8172b99a220d7e7a8e7170a05bc16270f27e2fd510ed8b297

    • SSDEEP

      384:MEHfFCjt8RcCwvvSA7wlVCWvHisVG+CVlk4Md9NiRh:Mgtm8RcCs64w2WvHO+AlkDN4h

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks