General

  • Target

    711436218aafd9e48adb190d0cef01a62162250de47e2691a769fa4de600a2ca.exe

  • Size

    282KB

  • Sample

    241202-zftnjs1qdx

  • MD5

    b3c728eb71744e9fda6bacf16c420bb8

  • SHA1

    ee16148e443620b7b62441a5e8bf4357e31c3a60

  • SHA256

    711436218aafd9e48adb190d0cef01a62162250de47e2691a769fa4de600a2ca

  • SHA512

    2e63a3f033529388d71d94e559279e6cbade4588a747f4ee1cb80ea91c0d0e39bf30d17aaa2dc2cc792dd9a5b5b6b3def0a6e2f09256bce206b4e044b5b528a9

  • SSDEEP

    6144:hgfABnR8YfEL01SHhRG/NqHtogoSok+AWGChCUVAwo:hFD9oCstdoS2tGChxAwo

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

105.103.6.61:444

Targets

    • Target

      711436218aafd9e48adb190d0cef01a62162250de47e2691a769fa4de600a2ca.exe

    • Size

      282KB

    • MD5

      b3c728eb71744e9fda6bacf16c420bb8

    • SHA1

      ee16148e443620b7b62441a5e8bf4357e31c3a60

    • SHA256

      711436218aafd9e48adb190d0cef01a62162250de47e2691a769fa4de600a2ca

    • SHA512

      2e63a3f033529388d71d94e559279e6cbade4588a747f4ee1cb80ea91c0d0e39bf30d17aaa2dc2cc792dd9a5b5b6b3def0a6e2f09256bce206b4e044b5b528a9

    • SSDEEP

      6144:hgfABnR8YfEL01SHhRG/NqHtogoSok+AWGChCUVAwo:hFD9oCstdoS2tGChxAwo

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks