General

  • Target

    1ac6e6feef40c59c426d0fb8c4b91df290ba0d97e469ccbef9c79ca16877282c

  • Size

    9KB

  • Sample

    241113-yh1n7s1qak

  • MD5

    f19603f6416c7670b4ecfd2e81c698a9

  • SHA1

    e280bf6ea73ba47f8c9a8039e3a5bd3a1c508e76

  • SHA256

    1ac6e6feef40c59c426d0fb8c4b91df290ba0d97e469ccbef9c79ca16877282c

  • SHA512

    99d1a83768d58ef32e700d6746b05d012655ab21fa735109a9b64ee06c7b7d968cec6583ddc0d238bb717cde120e8b731c4a18e51a0959d5761a91bd0521e71f

  • SSDEEP

    192:qb5f53qPWwi7FtjOLYwj7E5pz63MVUb7:qb5B3q5i7FtjU/j7AUH

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.8.219:3333

Targets

    • Target

      1ac6e6feef40c59c426d0fb8c4b91df290ba0d97e469ccbef9c79ca16877282c

    • Size

      9KB

    • MD5

      f19603f6416c7670b4ecfd2e81c698a9

    • SHA1

      e280bf6ea73ba47f8c9a8039e3a5bd3a1c508e76

    • SHA256

      1ac6e6feef40c59c426d0fb8c4b91df290ba0d97e469ccbef9c79ca16877282c

    • SHA512

      99d1a83768d58ef32e700d6746b05d012655ab21fa735109a9b64ee06c7b7d968cec6583ddc0d238bb717cde120e8b731c4a18e51a0959d5761a91bd0521e71f

    • SSDEEP

      192:qb5f53qPWwi7FtjOLYwj7E5pz63MVUb7:qb5B3q5i7FtjU/j7AUH

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

MITRE ATT&CK Enterprise v15

Tasks