General

  • Target

    749b8c2a8cb6d549ee32721f45484329a57c8a8b6c9a231cc5c9c379bc901f11.exe

  • Size

    14KB

  • Sample

    241204-jq9vhstnak

  • MD5

    44a9f9f7c7fdce89dce6b350ebcaa825

  • SHA1

    c37584aeb7dc992b56dd2b35f1571fbdab10e64a

  • SHA256

    749b8c2a8cb6d549ee32721f45484329a57c8a8b6c9a231cc5c9c379bc901f11

  • SHA512

    6579336bc44e40396c7cfe1aaeabe18f99bb28d19e93c44cb83d7fd83876e10d13e5526268958402dc55bd04c9e0c06af6e2deea56931f623e15052e19d40248

  • SSDEEP

    192:Urmb4+kKb18RebYNeUtwCINEmMUThL/YJ6EEn9sTZAAZCMF:Ur6usyebVUtwfMOjYscAXS

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.10.135:4444

Targets

    • Target

      749b8c2a8cb6d549ee32721f45484329a57c8a8b6c9a231cc5c9c379bc901f11.exe

    • Size

      14KB

    • MD5

      44a9f9f7c7fdce89dce6b350ebcaa825

    • SHA1

      c37584aeb7dc992b56dd2b35f1571fbdab10e64a

    • SHA256

      749b8c2a8cb6d549ee32721f45484329a57c8a8b6c9a231cc5c9c379bc901f11

    • SHA512

      6579336bc44e40396c7cfe1aaeabe18f99bb28d19e93c44cb83d7fd83876e10d13e5526268958402dc55bd04c9e0c06af6e2deea56931f623e15052e19d40248

    • SSDEEP

      192:Urmb4+kKb18RebYNeUtwCINEmMUThL/YJ6EEn9sTZAAZCMF:Ur6usyebVUtwfMOjYscAXS

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks