General

  • Target

    b52950fc5c508ad15e58b0d77ad76875ee198dca2f960a026c8da62509b70e05N

  • Size

    72KB

  • Sample

    241106-y88shazkdm

  • MD5

    04a651f333fde096a9a7929113c20f10

  • SHA1

    c59393d6fc99fe83b2f2db9fbc1bdfa6d89aecb1

  • SHA256

    b52950fc5c508ad15e58b0d77ad76875ee198dca2f960a026c8da62509b70e05

  • SHA512

    d05645faf96110a420f87753025690454ee483b6d974ad28e0b10891bd70890b0a87c0ec434611db61d77219dffefbb0fba559438f5e1f58abd297b6ee3e0939

  • SSDEEP

    1536:Ip72F2mNpJMD0tBBw2bMb+KR0Nc8QsJq39:PF2mNHMgtfw2be0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

10.10.14.5:8080

Targets

    • Target

      b52950fc5c508ad15e58b0d77ad76875ee198dca2f960a026c8da62509b70e05N

    • Size

      72KB

    • MD5

      04a651f333fde096a9a7929113c20f10

    • SHA1

      c59393d6fc99fe83b2f2db9fbc1bdfa6d89aecb1

    • SHA256

      b52950fc5c508ad15e58b0d77ad76875ee198dca2f960a026c8da62509b70e05

    • SHA512

      d05645faf96110a420f87753025690454ee483b6d974ad28e0b10891bd70890b0a87c0ec434611db61d77219dffefbb0fba559438f5e1f58abd297b6ee3e0939

    • SSDEEP

      1536:Ip72F2mNpJMD0tBBw2bMb+KR0Nc8QsJq39:PF2mNHMgtfw2be0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

MITRE ATT&CK Enterprise v15

Tasks