General

  • Target

    0f7fff304e0fe1a4bc0ca5eef9d34cdb6d2b43a9.exe

  • Size

    17KB

  • Sample

    241119-pc6hts1jfm

  • MD5

    f8a9322518123f8dfa7e2e4b02e21656

  • SHA1

    0f7fff304e0fe1a4bc0ca5eef9d34cdb6d2b43a9

  • SHA256

    ffea9176cfb8f8c009dfc8c1c4db6385e0155497dc42cd0e3dd356371c4089b8

  • SHA512

    fca2e548bb333ac59a4803ab783c5b4bfb466c5f7f59bcb787675db7c4444beafae9fe97beeb272c680f1573f204b864cd06a95cfcfb863e15f4c489732d3bae

  • SSDEEP

    384:OEEoLO56ayzcMj+uZvAc00EUGvQPCcmL6neqlkXMj/79Wx:RE8O56lcVuGv0TPCcfexX+79Wx

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp_dns

C2

190.130.88.59:4444

Targets

    • Target

      0f7fff304e0fe1a4bc0ca5eef9d34cdb6d2b43a9.exe

    • Size

      17KB

    • MD5

      f8a9322518123f8dfa7e2e4b02e21656

    • SHA1

      0f7fff304e0fe1a4bc0ca5eef9d34cdb6d2b43a9

    • SHA256

      ffea9176cfb8f8c009dfc8c1c4db6385e0155497dc42cd0e3dd356371c4089b8

    • SHA512

      fca2e548bb333ac59a4803ab783c5b4bfb466c5f7f59bcb787675db7c4444beafae9fe97beeb272c680f1573f204b864cd06a95cfcfb863e15f4c489732d3bae

    • SSDEEP

      384:OEEoLO56ayzcMj+uZvAc00EUGvQPCcmL6neqlkXMj/79Wx:RE8O56lcVuGv0TPCcfexX+79Wx

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

MITRE ATT&CK Enterprise v15

Tasks