General

  • Target

    502c52573bda48616cc58eee612cbce53493f3430f9aac14d64e0a051e6a878c

  • Size

    72KB

  • Sample

    240924-1c1hcszcrb

  • MD5

    b191d9f40a19522a508b625923bf8892

  • SHA1

    919edad17c79737b4217a0ffc07c4343f271a5b9

  • SHA256

    502c52573bda48616cc58eee612cbce53493f3430f9aac14d64e0a051e6a878c

  • SHA512

    363d585f2e0f4b8dbe4205bead67befd2a13be967cccceec4ae73723156521144638f2ca43b5541df88bdebcb4105caa3b5a315cfb336b4a645b16a54a3f8b78

  • SSDEEP

    1536:IARgLvyVZaDh3z8LKYZRlgzz3fMb+KR0Nc8QsJq39:dgLiZaD98LKURSv3fe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.226.133:443

Targets

    • Target

      502c52573bda48616cc58eee612cbce53493f3430f9aac14d64e0a051e6a878c

    • Size

      72KB

    • MD5

      b191d9f40a19522a508b625923bf8892

    • SHA1

      919edad17c79737b4217a0ffc07c4343f271a5b9

    • SHA256

      502c52573bda48616cc58eee612cbce53493f3430f9aac14d64e0a051e6a878c

    • SHA512

      363d585f2e0f4b8dbe4205bead67befd2a13be967cccceec4ae73723156521144638f2ca43b5541df88bdebcb4105caa3b5a315cfb336b4a645b16a54a3f8b78

    • SSDEEP

      1536:IARgLvyVZaDh3z8LKYZRlgzz3fMb+KR0Nc8QsJq39:dgLiZaD98LKURSv3fe0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks