General

  • Target

    ae43e9c5d02a3142443880566f27235c5f1101d3fd3826ddafa07e20de1933e4

  • Size

    61KB

  • Sample

    240919-h1vmxawglh

  • MD5

    50d8d8725cb65918c05ba1420d72b1dc

  • SHA1

    d09dee5d735ada4cc078f976b9f32508d43561ad

  • SHA256

    ae43e9c5d02a3142443880566f27235c5f1101d3fd3826ddafa07e20de1933e4

  • SHA512

    e09e3259064d5d2649acd7b62c9ac0c1e64093999fb1160e56f1a109cb7f31467d568baf6f896ac79e3f573456f071f8b8aa862ec19e89fb05d3698c6753b1e8

  • SSDEEP

    384:dK6KSUkeTW+y1SlixU1ZIYGUTJYPVw9qtTaVF2RYPFHwQfBXbJ8P89Z7L:dpTr+yEYG4BA+kzHhBmP89

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.128.129:8888

Targets

    • Target

      ae43e9c5d02a3142443880566f27235c5f1101d3fd3826ddafa07e20de1933e4

    • Size

      61KB

    • MD5

      50d8d8725cb65918c05ba1420d72b1dc

    • SHA1

      d09dee5d735ada4cc078f976b9f32508d43561ad

    • SHA256

      ae43e9c5d02a3142443880566f27235c5f1101d3fd3826ddafa07e20de1933e4

    • SHA512

      e09e3259064d5d2649acd7b62c9ac0c1e64093999fb1160e56f1a109cb7f31467d568baf6f896ac79e3f573456f071f8b8aa862ec19e89fb05d3698c6753b1e8

    • SSDEEP

      384:dK6KSUkeTW+y1SlixU1ZIYGUTJYPVw9qtTaVF2RYPFHwQfBXbJ8P89Z7L:dpTr+yEYG4BA+kzHhBmP89

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks