General

  • Target

    injectorPRO.exe

  • Size

    17KB

  • Sample

    241218-xlny5sypep

  • MD5

    d1adc890e952aba11a3bf118243d8f49

  • SHA1

    b0656e5cae0c288ddb376e15ca8d9e2e397cfce5

  • SHA256

    e9ccbf5fa7f41a02d5e1e9d67d29d68a364f73d021926795e656402c6fa0f7e2

  • SHA512

    47d026f8bef2695916717f24fa1e41b23fd40331b5c0c938f52e238b254d7f2dd92713b18d595a4f73ccd4543acb631e227d6a00e641a30f587d0878c0b2d127

  • SSDEEP

    384:Y9EEoLO56ayzcMj+s+XY5cUICgjlKYgFI2cl1caXUlciFxwmcLHa7Q:5E8O56lcVs+XYLVYg9cl1caXkciFjc28

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.178.36:9999

Targets

    • Target

      injectorPRO.exe

    • Size

      17KB

    • MD5

      d1adc890e952aba11a3bf118243d8f49

    • SHA1

      b0656e5cae0c288ddb376e15ca8d9e2e397cfce5

    • SHA256

      e9ccbf5fa7f41a02d5e1e9d67d29d68a364f73d021926795e656402c6fa0f7e2

    • SHA512

      47d026f8bef2695916717f24fa1e41b23fd40331b5c0c938f52e238b254d7f2dd92713b18d595a4f73ccd4543acb631e227d6a00e641a30f587d0878c0b2d127

    • SSDEEP

      384:Y9EEoLO56ayzcMj+s+XY5cUICgjlKYgFI2cl1caXUlciFxwmcLHa7Q:5E8O56lcVs+XYLVYg9cl1caXkciFjc28

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

MITRE ATT&CK Enterprise v15

Tasks