General

  • Target

    28ca2a3476ddc12bb2d499b6ff64c1524bc2e99d04d767376a9b826a81fb0850

  • Size

    3.1MB

  • Sample

    241225-ed6vwaxjew

  • MD5

    d1828925bc7e45fd17ceef5576e20e51

  • SHA1

    a3f324bb688cb1e62f282b5875a8e713cf11bc1d

  • SHA256

    28ca2a3476ddc12bb2d499b6ff64c1524bc2e99d04d767376a9b826a81fb0850

  • SHA512

    ee03e720c56bb3e21ae0227213c6f19d0cbfca002ff7cad4b6f6f14f1505eaeb7af0e251c245c64307c7004369b98e19850daca18d8c7667ba4a8823e281ace7

  • SSDEEP

    98304:lbJddHSzfIcnoqQw2RddRfDviS8kNqluLEdVUrQuwi1oL:b7+fhn92RRfDiS8kNqlt/UEulGL

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.159.133:5566

Targets

    • Target

      28ca2a3476ddc12bb2d499b6ff64c1524bc2e99d04d767376a9b826a81fb0850

    • Size

      3.1MB

    • MD5

      d1828925bc7e45fd17ceef5576e20e51

    • SHA1

      a3f324bb688cb1e62f282b5875a8e713cf11bc1d

    • SHA256

      28ca2a3476ddc12bb2d499b6ff64c1524bc2e99d04d767376a9b826a81fb0850

    • SHA512

      ee03e720c56bb3e21ae0227213c6f19d0cbfca002ff7cad4b6f6f14f1505eaeb7af0e251c245c64307c7004369b98e19850daca18d8c7667ba4a8823e281ace7

    • SSDEEP

      98304:lbJddHSzfIcnoqQw2RddRfDviS8kNqluLEdVUrQuwi1oL:b7+fhn92RRfDiS8kNqlt/UEulGL

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks