General

  • Target

    b52aeea671d218c9e339901d1aea7aba62d32bf11bc54b275f869650fa3a9f4c

  • Size

    45KB

  • Sample

    241224-t671za1ret

  • MD5

    69cafa2efbe8128dd042c780497a1f2f

  • SHA1

    bc9de8c8421b7f52d38ec092ab945cd29007f8e1

  • SHA256

    b52aeea671d218c9e339901d1aea7aba62d32bf11bc54b275f869650fa3a9f4c

  • SHA512

    7f3fd63814ce6838170dd1b99b8fe97842e11e39b200957daf50b5a4ec4844ee5f1c8db3b4a3486c49adca0570831f3f190a4bd9741d6015aa26d61769742a79

  • SSDEEP

    768:HyEn6L06E8FgVRpcPP3lLuzZPKqOcFX3bDJ0t:IL3E8aDpcPP3lLuBZOy33J0t

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

123.60.216.83:28888

Targets

    • Target

      b52aeea671d218c9e339901d1aea7aba62d32bf11bc54b275f869650fa3a9f4c

    • Size

      45KB

    • MD5

      69cafa2efbe8128dd042c780497a1f2f

    • SHA1

      bc9de8c8421b7f52d38ec092ab945cd29007f8e1

    • SHA256

      b52aeea671d218c9e339901d1aea7aba62d32bf11bc54b275f869650fa3a9f4c

    • SHA512

      7f3fd63814ce6838170dd1b99b8fe97842e11e39b200957daf50b5a4ec4844ee5f1c8db3b4a3486c49adca0570831f3f190a4bd9741d6015aa26d61769742a79

    • SSDEEP

      768:HyEn6L06E8FgVRpcPP3lLuzZPKqOcFX3bDJ0t:IL3E8aDpcPP3lLuBZOy33J0t

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

MITRE ATT&CK Enterprise v15

Tasks