General

  • Target

    796f85775fbcf37ef5189ba176c17840515e96925ed4afffa96f2390751c92b5

  • Size

    72KB

  • Sample

    241120-aptbpswlgy

  • MD5

    175c4ab33364b28b9f2b11d0a7781984

  • SHA1

    8345dedef30cbe20645a5ca8ee3b344c7793b336

  • SHA256

    796f85775fbcf37ef5189ba176c17840515e96925ed4afffa96f2390751c92b5

  • SHA512

    6981394102e13ae2a9a3aacf63d5f7a06bb8b39e1a7698fe1dd60e3bbf43bfcddb988098923732d90120938ef4624a34c8ab705b3371df6d3d33847e154a0382

  • SSDEEP

    1536:IaqyBol8ebK4jdGF0V3lMYAJP25gdrMb+KR0Nc8QsJq39:VqUoDKMGWV3aY0PmUre0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.2.84:3333

Targets

    • Target

      796f85775fbcf37ef5189ba176c17840515e96925ed4afffa96f2390751c92b5

    • Size

      72KB

    • MD5

      175c4ab33364b28b9f2b11d0a7781984

    • SHA1

      8345dedef30cbe20645a5ca8ee3b344c7793b336

    • SHA256

      796f85775fbcf37ef5189ba176c17840515e96925ed4afffa96f2390751c92b5

    • SHA512

      6981394102e13ae2a9a3aacf63d5f7a06bb8b39e1a7698fe1dd60e3bbf43bfcddb988098923732d90120938ef4624a34c8ab705b3371df6d3d33847e154a0382

    • SSDEEP

      1536:IaqyBol8ebK4jdGF0V3lMYAJP25gdrMb+KR0Nc8QsJq39:VqUoDKMGWV3aY0PmUre0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

MITRE ATT&CK Enterprise v15

Tasks