General

  • Target

    yo.exe

  • Size

    72KB

  • Sample

    240924-qzw4cazhre

  • MD5

    c004f55c954e3b995788d1d3abe815ab

  • SHA1

    4691674c4844caba90a6f0ae998588f6c7cfaf2c

  • SHA256

    7a3ae259515d538a318c0a474ed43fa5b4c8fba8364a3f3411f3e474c4d58206

  • SHA512

    394ada2157fa49cbe29b01db11257e05e16d4005b1cc0f646dcfa28015d3ee6ff23c259d8fdd199d141736f9b22cbf673465ff3f62b826c0c4add42dd1e813cd

  • SSDEEP

    1536:IDaNA5bkrHwBboikAuM/Fg6XMb+KR0Nc8QsJq39:4+A5bS6botM/Fve0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

80.190.85.84:2923

Targets

    • Target

      yo.exe

    • Size

      72KB

    • MD5

      c004f55c954e3b995788d1d3abe815ab

    • SHA1

      4691674c4844caba90a6f0ae998588f6c7cfaf2c

    • SHA256

      7a3ae259515d538a318c0a474ed43fa5b4c8fba8364a3f3411f3e474c4d58206

    • SHA512

      394ada2157fa49cbe29b01db11257e05e16d4005b1cc0f646dcfa28015d3ee6ff23c259d8fdd199d141736f9b22cbf673465ff3f62b826c0c4add42dd1e813cd

    • SSDEEP

      1536:IDaNA5bkrHwBboikAuM/Fg6XMb+KR0Nc8QsJq39:4+A5bS6botM/Fve0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks