General

  • Target

    b7835450f0d1953e041953e5a4614c4072f257771a130437e914b97e0b6e9270N

  • Size

    72KB

  • Sample

    241002-rt4fxavdla

  • MD5

    99a57348ce4304cd6492bdbe7ae32920

  • SHA1

    28949510b417fd9ca975f3345b72bfcc742f5b28

  • SHA256

    b7835450f0d1953e041953e5a4614c4072f257771a130437e914b97e0b6e9270

  • SHA512

    bc0f81ca39098e2711f917fe429ea2069905507018ba21ec81faf971f71c1073e62cf9cbe3b27d8180039d52f7b6ed857c15d08698e104bcc20683570434fc96

  • SSDEEP

    1536:IR+fyYC9YuFqFQRngDp7ElXzxeFMb+KR0Nc8QsJq39:0F9YuFqOgDRQXNeFe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

127.0.0.1:4444

Targets

    • Target

      b7835450f0d1953e041953e5a4614c4072f257771a130437e914b97e0b6e9270N

    • Size

      72KB

    • MD5

      99a57348ce4304cd6492bdbe7ae32920

    • SHA1

      28949510b417fd9ca975f3345b72bfcc742f5b28

    • SHA256

      b7835450f0d1953e041953e5a4614c4072f257771a130437e914b97e0b6e9270

    • SHA512

      bc0f81ca39098e2711f917fe429ea2069905507018ba21ec81faf971f71c1073e62cf9cbe3b27d8180039d52f7b6ed857c15d08698e104bcc20683570434fc96

    • SSDEEP

      1536:IR+fyYC9YuFqFQRngDp7ElXzxeFMb+KR0Nc8QsJq39:0F9YuFqOgDRQXNeFe0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks