General

  • Target

    4a4a2e1f7349ff6fbe9fae2a351a4ded890456206759eefdaf4500c1301589c4

  • Size

    102KB

  • Sample

    240926-cpd8wsvbja

  • MD5

    eb5916b705192dd17d6e3e663607237f

  • SHA1

    fb6de4aed2c1d6faba5f05dafedd37eaf623b2c3

  • SHA256

    4a4a2e1f7349ff6fbe9fae2a351a4ded890456206759eefdaf4500c1301589c4

  • SHA512

    3e896a3ac3d8ff1538e6ed23469405671822e20524e5a719a60cca2753d352978fefd641fad507ce20946fc45516860d4901fb49f378e555db1cac3a7d28c2b0

  • SSDEEP

    3072:dZOUuns9YeoRYzdhEUNopp/uHvM8IhZRi0nYP7U:eu3DB2UizhfxYD

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

172.16.230.204:2422

Targets

    • Target

      4a4a2e1f7349ff6fbe9fae2a351a4ded890456206759eefdaf4500c1301589c4

    • Size

      102KB

    • MD5

      eb5916b705192dd17d6e3e663607237f

    • SHA1

      fb6de4aed2c1d6faba5f05dafedd37eaf623b2c3

    • SHA256

      4a4a2e1f7349ff6fbe9fae2a351a4ded890456206759eefdaf4500c1301589c4

    • SHA512

      3e896a3ac3d8ff1538e6ed23469405671822e20524e5a719a60cca2753d352978fefd641fad507ce20946fc45516860d4901fb49f378e555db1cac3a7d28c2b0

    • SSDEEP

      3072:dZOUuns9YeoRYzdhEUNopp/uHvM8IhZRi0nYP7U:eu3DB2UizhfxYD

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks