General

  • Target

    svchost.exe

  • Size

    17KB

  • Sample

    241219-yvf6bsynhl

  • MD5

    a2de68a2f41e67db9a7acc4f499e7408

  • SHA1

    919c6474c6f8897677e9bd68e2f7d7c082a3e8f9

  • SHA256

    d4a0ab9a7174e5d01f4d0b741d2175a0fe9b489ef26792ae79c80fded9e49740

  • SHA512

    a1b36235ef3bffbb4e77a87ca38b463cc070e2f5cefb0834dfdf9b49256f5f00829ca7a5335147c64bd84d15cf2cfa87c9e2a868023d35e9c744f2a182f7fe6e

  • SSDEEP

    192:PXRi1E9psGBuYWqgePAz7vd5joQDZLZuFoUprzoU1gA8r66em8tfYZ1nijXh:vjpkn/eoz7vd6QDmFV3g3CfY3Ih

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Targets

    • Target

      svchost.exe

    • Size

      17KB

    • MD5

      a2de68a2f41e67db9a7acc4f499e7408

    • SHA1

      919c6474c6f8897677e9bd68e2f7d7c082a3e8f9

    • SHA256

      d4a0ab9a7174e5d01f4d0b741d2175a0fe9b489ef26792ae79c80fded9e49740

    • SHA512

      a1b36235ef3bffbb4e77a87ca38b463cc070e2f5cefb0834dfdf9b49256f5f00829ca7a5335147c64bd84d15cf2cfa87c9e2a868023d35e9c744f2a182f7fe6e

    • SSDEEP

      192:PXRi1E9psGBuYWqgePAz7vd5joQDZLZuFoUprzoU1gA8r66em8tfYZ1nijXh:vjpkn/eoz7vd6QDmFV3g3CfY3Ih

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

MITRE ATT&CK Matrix

Tasks