General

  • Target

    d2c57d24dbda375214c4df8c774533e91c3f75f87aa675a48d596ddd6df59651

  • Size

    2KB

  • Sample

    241221-vx9zmsvjfk

  • MD5

    d4779a6d8ad306acb39dcb44012303a9

  • SHA1

    65294d28d6afdd32016ffbe16524fd63209559d3

  • SHA256

    d2c57d24dbda375214c4df8c774533e91c3f75f87aa675a48d596ddd6df59651

  • SHA512

    6fe63a289cbfeda26ec27c0c3f2749af0765999b77e270d6b4056c52ac9fe51c8053ec24302b7a3d674d2676d2e0e572409514e0e3cf393e7091964371cce82d

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Targets

    • Target

      ea7d79f0ddb431684f63a901afc596af24898555200fc14cc2616e42ab95ea5d.bin

    • Size

      1KB

    • MD5

      f105102404cda7e7de2ac1ae54d9a78c

    • SHA1

      8ff5bcf2c69056780f0a7b51c96bba243dca2201

    • SHA256

      ea7d79f0ddb431684f63a901afc596af24898555200fc14cc2616e42ab95ea5d

    • SHA512

      587541b47ea669cd3a5cf952ed678b2399c9be0511455b3ac8476072fcb7a713489405a7f35506b7197674678350ead3437847d513fb63f4f8a9db447f99c92c

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

MITRE ATT&CK Enterprise v15

Tasks