General

  • Target

    1b68cd8954edea00f1923dd51b3818537fbff0ba24a978ee93bdb0e49b038fbdN.exe

  • Size

    46KB

  • Sample

    241211-vgwgbawlfp

  • MD5

    60a54296d58b87696d55199975999f10

  • SHA1

    678231fbfeb5bf96e5464000753766d1be37050f

  • SHA256

    1b68cd8954edea00f1923dd51b3818537fbff0ba24a978ee93bdb0e49b038fbd

  • SHA512

    f91b3e8f0c616147f12897d53f7a1c8241103750525d3a3208efa79e2814b94c3ca2988032678a67fcad1ed9b22092293472f07e8bc6f8bdf99fdc4991bf0d1f

  • SSDEEP

    768:IUJhfx0FdmPKpCoeexG/cikTK3hyRf38pLjiiQ9026CNDIYcnbcuyD7UFq3:IAfxMdFpB1GYTiwL6C9Dcnouy8Fq3

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

46.183.27.148:4444

Targets

    • Target

      1b68cd8954edea00f1923dd51b3818537fbff0ba24a978ee93bdb0e49b038fbdN.exe

    • Size

      46KB

    • MD5

      60a54296d58b87696d55199975999f10

    • SHA1

      678231fbfeb5bf96e5464000753766d1be37050f

    • SHA256

      1b68cd8954edea00f1923dd51b3818537fbff0ba24a978ee93bdb0e49b038fbd

    • SHA512

      f91b3e8f0c616147f12897d53f7a1c8241103750525d3a3208efa79e2814b94c3ca2988032678a67fcad1ed9b22092293472f07e8bc6f8bdf99fdc4991bf0d1f

    • SSDEEP

      768:IUJhfx0FdmPKpCoeexG/cikTK3hyRf38pLjiiQ9026CNDIYcnbcuyD7UFq3:IAfxMdFpB1GYTiwL6C9Dcnouy8Fq3

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks