General

  • Target

    4f94ff7c69fcfdc3fa732ef0cf3b541542a6d14eed0966c8c36d59ebe13dc85aN

  • Size

    72KB

  • Sample

    240920-q45w2szbla

  • MD5

    27341417b941924bb8ff6578097a4960

  • SHA1

    17ff8b228a3c2c34cbc01e49e37c68da4022915e

  • SHA256

    4f94ff7c69fcfdc3fa732ef0cf3b541542a6d14eed0966c8c36d59ebe13dc85a

  • SHA512

    91f42c36c6cb0a5292376044bfd07049e19eccff938dcc5a51b513801b984f7f3ec32efbb9d12048125d314e6aa8847e390fd206dbd683b08f59f64f1b90eec8

  • SSDEEP

    1536:IqrTnDchXNXBfIy3VtAjwqNRtFRLmTQMb+KR0Nc8QsJq39:XrTDQ9j3VOwqlFRLmEe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/exec

Targets

    • Target

      4f94ff7c69fcfdc3fa732ef0cf3b541542a6d14eed0966c8c36d59ebe13dc85aN

    • Size

      72KB

    • MD5

      27341417b941924bb8ff6578097a4960

    • SHA1

      17ff8b228a3c2c34cbc01e49e37c68da4022915e

    • SHA256

      4f94ff7c69fcfdc3fa732ef0cf3b541542a6d14eed0966c8c36d59ebe13dc85a

    • SHA512

      91f42c36c6cb0a5292376044bfd07049e19eccff938dcc5a51b513801b984f7f3ec32efbb9d12048125d314e6aa8847e390fd206dbd683b08f59f64f1b90eec8

    • SSDEEP

      1536:IqrTnDchXNXBfIy3VtAjwqNRtFRLmTQMb+KR0Nc8QsJq39:XrTDQ9j3VOwqlFRLmEe0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

MITRE ATT&CK Enterprise v15

Tasks