General

  • Target

    49df11bd97e131b82d2be98485400349580f6757766ec2dec2c6795b999ac523N.exe

  • Size

    72KB

  • Sample

    241119-n4tgxavhrd

  • MD5

    efa7db77a4820190ae83f8f2af6fa150

  • SHA1

    d53b5a20ed5c8eb98f04779643f1ce37c566c537

  • SHA256

    49df11bd97e131b82d2be98485400349580f6757766ec2dec2c6795b999ac523

  • SHA512

    4ea6cafd984fa9135bd3c0befd49266becf582ffcc3fb067ed0f03c417dfc7c6a18c44ff12633110c49159734e4b0d911dbfc5d6e6aaf8e94a2d838fd1e44e2b

  • SSDEEP

    1536:IkDbpIJTF1t6QlCLVLqrMyRSxpzMb+KR0Nc8QsJq39:9bpIp5RwLVL4Mygxte0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.190.128:443

Targets

    • Target

      49df11bd97e131b82d2be98485400349580f6757766ec2dec2c6795b999ac523N.exe

    • Size

      72KB

    • MD5

      efa7db77a4820190ae83f8f2af6fa150

    • SHA1

      d53b5a20ed5c8eb98f04779643f1ce37c566c537

    • SHA256

      49df11bd97e131b82d2be98485400349580f6757766ec2dec2c6795b999ac523

    • SHA512

      4ea6cafd984fa9135bd3c0befd49266becf582ffcc3fb067ed0f03c417dfc7c6a18c44ff12633110c49159734e4b0d911dbfc5d6e6aaf8e94a2d838fd1e44e2b

    • SSDEEP

      1536:IkDbpIJTF1t6QlCLVLqrMyRSxpzMb+KR0Nc8QsJq39:9bpIp5RwLVL4Mygxte0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

MITRE ATT&CK Enterprise v15

Tasks