General

  • Target

    69c47beb093250556f97c814c422dcfafb902fbef6ee8eba97764ac478950c23.exe

  • Size

    46KB

  • Sample

    241210-x35cfsvpby

  • MD5

    1dd9287bef4915570d34424dfcaf453b

  • SHA1

    a708671e84c10e3208759251fefcb3ce4ea6756f

  • SHA256

    69c47beb093250556f97c814c422dcfafb902fbef6ee8eba97764ac478950c23

  • SHA512

    cb60a1030d0efdd573f8ba294f29bf3e9f65e5d66bbaf22600c6b073ea402ec17905bfc11e9a739bd626275751ba76eb53e50ba95a105441d23ce4cfb6e247db

  • SSDEEP

    768:IUJhfx0FdmPKpCoeexG/cikTK3hyRf38pLjiiQ9026CNDIYcnbcuyD7UFq3Q:IAfxMdFpB1GYTiwL6C9Dcnouy8Fq3Q

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

46.183.27.148:4444

Targets

    • Target

      69c47beb093250556f97c814c422dcfafb902fbef6ee8eba97764ac478950c23.exe

    • Size

      46KB

    • MD5

      1dd9287bef4915570d34424dfcaf453b

    • SHA1

      a708671e84c10e3208759251fefcb3ce4ea6756f

    • SHA256

      69c47beb093250556f97c814c422dcfafb902fbef6ee8eba97764ac478950c23

    • SHA512

      cb60a1030d0efdd573f8ba294f29bf3e9f65e5d66bbaf22600c6b073ea402ec17905bfc11e9a739bd626275751ba76eb53e50ba95a105441d23ce4cfb6e247db

    • SSDEEP

      768:IUJhfx0FdmPKpCoeexG/cikTK3hyRf38pLjiiQ9026CNDIYcnbcuyD7UFq3Q:IAfxMdFpB1GYTiwL6C9Dcnouy8Fq3Q

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks