General

  • Target

    6c319adfc094f983e65d8139557d2c87ad69972d32d72ff3dbc5c819b5db5c86

  • Size

    11KB

  • Sample

    241206-sjkrgstkft

  • MD5

    ecaec31423899e13bac438486148aede

  • SHA1

    a0bfe4f65000f8d660620224cd734a4b60a895d2

  • SHA256

    6c319adfc094f983e65d8139557d2c87ad69972d32d72ff3dbc5c819b5db5c86

  • SHA512

    7643a4b75f7a838020898fa0b90bc2600982dd8491cd8856db040eeb5971975a1ad6d92e19b03564730905f9f444c85b555b6ae5f11924867c8f606e7166e665

  • SSDEEP

    192:739zwd5BJauI8PhSrVEWS2Eyekr7E5pz6fMwWe6O:73hwRG8JSrVE0L57fWe6

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.196.144:10010

Targets

    • Target

      6c319adfc094f983e65d8139557d2c87ad69972d32d72ff3dbc5c819b5db5c86

    • Size

      11KB

    • MD5

      ecaec31423899e13bac438486148aede

    • SHA1

      a0bfe4f65000f8d660620224cd734a4b60a895d2

    • SHA256

      6c319adfc094f983e65d8139557d2c87ad69972d32d72ff3dbc5c819b5db5c86

    • SHA512

      7643a4b75f7a838020898fa0b90bc2600982dd8491cd8856db040eeb5971975a1ad6d92e19b03564730905f9f444c85b555b6ae5f11924867c8f606e7166e665

    • SSDEEP

      192:739zwd5BJauI8PhSrVEWS2Eyekr7E5pz6fMwWe6O:73hwRG8JSrVE0L57fWe6

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

MITRE ATT&CK Enterprise v15

Tasks