General

  • Target

    2712-7-0x0000000000400000-0x0000000000404000-memory.dmp

  • Size

    16KB

  • Sample

    241205-warp8avldx

  • MD5

    ebb3b9179e51ff1e9b5c7fd0f7508cdf

  • SHA1

    bfd0d91c9302c80605cadd03c1ecd136b8a97602

  • SHA256

    fc15346996d1241b708f4bae20457b548d6e0413848f09103c67aa9c2156925e

  • SHA512

    b8fb382178cc7693ec7a080467f225f50c10ebe5db621e0dc98d2298d0d8e10ba1c0dfe2f3210477738632b00b7ebdd5d3ab98e5b265c73d0b66cb1f1d35b5e6

  • SSDEEP

    48:6zidkp98GbPhi5vB2UHo23E28bkZ91dE3gilmx8j2v/G2eB:qskn8GPhiZdHw28ES3DlL2vje

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_http

C2

http://89.197.154.116:7810/GHCSKLHA62xAo0GiJ65tlwmFvMO6tQNKeTswMuKxpybsim_N2RnNTId_j8dnBmA9vnYOyNR6EU7eXYS6AY-Rox46MWUiLVByUmCfxHjNCsvWTIsFuGs9e3XKhc2dJ6Jls10lHzhDwU0eh84XVkCbmUwBJfgF33CNXlpD8tpFnQKUyLbbyQTF_Cn32t6uqwBi89JgBGKEY_FfUBSCI4FljPsd9uXGcHm2BThT

Targets

    • Target

      2712-7-0x0000000000400000-0x0000000000404000-memory.dmp

    • Size

      16KB

    • MD5

      ebb3b9179e51ff1e9b5c7fd0f7508cdf

    • SHA1

      bfd0d91c9302c80605cadd03c1ecd136b8a97602

    • SHA256

      fc15346996d1241b708f4bae20457b548d6e0413848f09103c67aa9c2156925e

    • SHA512

      b8fb382178cc7693ec7a080467f225f50c10ebe5db621e0dc98d2298d0d8e10ba1c0dfe2f3210477738632b00b7ebdd5d3ab98e5b265c73d0b66cb1f1d35b5e6

    • SSDEEP

      48:6zidkp98GbPhi5vB2UHo23E28bkZ91dE3gilmx8j2v/G2eB:qskn8GPhiZdHw28ES3DlL2vje

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks