General

  • Target

    890f282de6fdbce7ec9078cbc6f18558564349d6c1d6b11adce754c2f395d319

  • Size

    53KB

  • Sample

    241212-ztx8wsyrfm

  • MD5

    ca6930bbce3afe5de592e8dd91ec6a12

  • SHA1

    e36b725d9689b9bc73a25241c5a1e5dc3b51e26d

  • SHA256

    890f282de6fdbce7ec9078cbc6f18558564349d6c1d6b11adce754c2f395d319

  • SHA512

    fc69dbf2d3307ed35bfca2dec0c0f3034ab7a0a80d0d259fb5d421eedb131788654b8ead4ec1adacb2c8190206f2691b4b734f6d3d9caaf600f1002478ede3ea

  • SSDEEP

    384:cvTB5ZNaJ35ZxzGtzbPK+0w5C2iSwvxjk+tq+yNXNwOv5h50jbcctLC3FeFa:ybZkZxzGtzC1Zxw+tDY5P3FeFa

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.8.78:1234

Targets

    • Target

      890f282de6fdbce7ec9078cbc6f18558564349d6c1d6b11adce754c2f395d319

    • Size

      53KB

    • MD5

      ca6930bbce3afe5de592e8dd91ec6a12

    • SHA1

      e36b725d9689b9bc73a25241c5a1e5dc3b51e26d

    • SHA256

      890f282de6fdbce7ec9078cbc6f18558564349d6c1d6b11adce754c2f395d319

    • SHA512

      fc69dbf2d3307ed35bfca2dec0c0f3034ab7a0a80d0d259fb5d421eedb131788654b8ead4ec1adacb2c8190206f2691b4b734f6d3d9caaf600f1002478ede3ea

    • SSDEEP

      384:cvTB5ZNaJ35ZxzGtzbPK+0w5C2iSwvxjk+tq+yNXNwOv5h50jbcctLC3FeFa:ybZkZxzGtzC1Zxw+tDY5P3FeFa

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks