General

  • Target

    dee8b111154a8164a6d1cc08e057011117cc48f1f98f16f72412c27fa0c4f0a1

  • Size

    72KB

  • Sample

    241123-e3rggsvjhq

  • MD5

    9f17f0fa11ab30970bd3e64fb59e26d3

  • SHA1

    8e43e8aa42c5062bcf21d93f76be45d9f8206982

  • SHA256

    dee8b111154a8164a6d1cc08e057011117cc48f1f98f16f72412c27fa0c4f0a1

  • SHA512

    997e45281d8dd4bf3de9aa2d9ce01a56ef4354649f424eee354eca983902e053e35357cf44e669824142d401434c66be0700557942bb3c4450c4c0e20c040f5a

  • SSDEEP

    1536:IlbPGGCo+yUqJknEPK07N2iUI0aFCexMb+KR0Nc8QsJq39:IPC66ES0+XaFLxe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

10.0.2.15:4444

Targets

    • Target

      dee8b111154a8164a6d1cc08e057011117cc48f1f98f16f72412c27fa0c4f0a1

    • Size

      72KB

    • MD5

      9f17f0fa11ab30970bd3e64fb59e26d3

    • SHA1

      8e43e8aa42c5062bcf21d93f76be45d9f8206982

    • SHA256

      dee8b111154a8164a6d1cc08e057011117cc48f1f98f16f72412c27fa0c4f0a1

    • SHA512

      997e45281d8dd4bf3de9aa2d9ce01a56ef4354649f424eee354eca983902e053e35357cf44e669824142d401434c66be0700557942bb3c4450c4c0e20c040f5a

    • SSDEEP

      1536:IlbPGGCo+yUqJknEPK07N2iUI0aFCexMb+KR0Nc8QsJq39:IPC66ES0+XaFLxe0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

MITRE ATT&CK Enterprise v15

Tasks