General

  • Target

    cff3101c6b25eff38ae239d34cc1dbfb15aab95e0961cf2da398c34a0496873d

  • Size

    39KB

  • Sample

    241113-wycafawmfy

  • MD5

    d1d2086dce4f0bb6ece506b728a0c7dc

  • SHA1

    82e3219340adea49d35e346996a104fb43109668

  • SHA256

    cff3101c6b25eff38ae239d34cc1dbfb15aab95e0961cf2da398c34a0496873d

  • SHA512

    b73c7c6b64c7af7ceae5026b93dd69bc04cbbc72f0e8a39a630950b3a83bb707e150c35f765676cfed69eea891f86ff8a3cbf7d95c772ca97b072db7462199bd

  • SSDEEP

    384:Hl1sels4Hgi5tan7fVcYUokC1AnSvr0tZOwPhiOmU4ByD2uSFvW:F1sw1gi5onjlZZz0tZ3h9L4ByDX

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.8.219:3333

Targets

    • Target

      cff3101c6b25eff38ae239d34cc1dbfb15aab95e0961cf2da398c34a0496873d

    • Size

      39KB

    • MD5

      d1d2086dce4f0bb6ece506b728a0c7dc

    • SHA1

      82e3219340adea49d35e346996a104fb43109668

    • SHA256

      cff3101c6b25eff38ae239d34cc1dbfb15aab95e0961cf2da398c34a0496873d

    • SHA512

      b73c7c6b64c7af7ceae5026b93dd69bc04cbbc72f0e8a39a630950b3a83bb707e150c35f765676cfed69eea891f86ff8a3cbf7d95c772ca97b072db7462199bd

    • SSDEEP

      384:Hl1sels4Hgi5tan7fVcYUokC1AnSvr0tZOwPhiOmU4ByD2uSFvW:F1sw1gi5onjlZZz0tZ3h9L4ByDX

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

MITRE ATT&CK Enterprise v15

Tasks