General

  • Target

    32a9c4aca0a172b9d4fa886e4ad3567ac90cec76d165237a9d93624f3b833f11.exe

  • Size

    17KB

  • Sample

    241206-bqjz4asmhv

  • MD5

    d9b2484af12098d68ac2c39e5962ce60

  • SHA1

    94d52e1d9abb4d83a32d38180633a11a64249e01

  • SHA256

    32a9c4aca0a172b9d4fa886e4ad3567ac90cec76d165237a9d93624f3b833f11

  • SHA512

    6bdfc11db4365a22f639b6881d531e31d7bac37accc2cdb6d6b7cec82fbc91e7f7ebe8e0d24357dab1dd1f7cdb6f1058f4b9f96098358d373f74395af307f706

  • SSDEEP

    384:HEEoLO56ayzcMj+/4y8qYj1jewPbcY5+INel1nfTJYQV:kE8O56lcV/4yrwPbcU+INenfTSQV

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.1.110:4444

Targets

    • Target

      32a9c4aca0a172b9d4fa886e4ad3567ac90cec76d165237a9d93624f3b833f11.exe

    • Size

      17KB

    • MD5

      d9b2484af12098d68ac2c39e5962ce60

    • SHA1

      94d52e1d9abb4d83a32d38180633a11a64249e01

    • SHA256

      32a9c4aca0a172b9d4fa886e4ad3567ac90cec76d165237a9d93624f3b833f11

    • SHA512

      6bdfc11db4365a22f639b6881d531e31d7bac37accc2cdb6d6b7cec82fbc91e7f7ebe8e0d24357dab1dd1f7cdb6f1058f4b9f96098358d373f74395af307f706

    • SSDEEP

      384:HEEoLO56ayzcMj+/4y8qYj1jewPbcY5+INel1nfTJYQV:kE8O56lcV/4yrwPbcU+INenfTSQV

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

MITRE ATT&CK Enterprise v15

Tasks