General

  • Target

    896ce8b99b199a327a001947647f406a0f0891856ef10f1f18a4c046aed5068bN.exe

  • Size

    168KB

  • Sample

    241130-gmjg2szqcr

  • MD5

    af373421f15aca3953d490dcea49c230

  • SHA1

    93da17addf31467e51347c7c576dc6a83e28cd80

  • SHA256

    896ce8b99b199a327a001947647f406a0f0891856ef10f1f18a4c046aed5068b

  • SHA512

    7eea4780f44bb0dc3e227af9e79f1be10ff8d31a3db8d4df4032981c1ff206fa167d7f3c33fe366443c899c97e8d793e0ab5b652a794c3ed15df5f2797b854ca

  • SSDEEP

    3072:yxPMxjOS5xrIuDQ4/9s8kqo+e0Nc8QsUTiZeJ:yi5OiI9qKXqG0Nc8QsfA

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.1.100:4444

Targets

    • Target

      896ce8b99b199a327a001947647f406a0f0891856ef10f1f18a4c046aed5068bN.exe

    • Size

      168KB

    • MD5

      af373421f15aca3953d490dcea49c230

    • SHA1

      93da17addf31467e51347c7c576dc6a83e28cd80

    • SHA256

      896ce8b99b199a327a001947647f406a0f0891856ef10f1f18a4c046aed5068b

    • SHA512

      7eea4780f44bb0dc3e227af9e79f1be10ff8d31a3db8d4df4032981c1ff206fa167d7f3c33fe366443c899c97e8d793e0ab5b652a794c3ed15df5f2797b854ca

    • SSDEEP

      3072:yxPMxjOS5xrIuDQ4/9s8kqo+e0Nc8QsUTiZeJ:yi5OiI9qKXqG0Nc8QsfA

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks