General

  • Target

    5c3e7afb933472823ff76245e3a6f1e94827da16c65f4c1f60b2574559bb7823

  • Size

    3.3MB

  • Sample

    201111-r16vvtw1vs

  • MD5

    24d138c8c647374dc46ebcf35144c887

  • SHA1

    8f3aba2d700df244557e624279093d03d35a7cc8

  • SHA256

    5c3e7afb933472823ff76245e3a6f1e94827da16c65f4c1f60b2574559bb7823

  • SHA512

    751ee9dd1f18517bc0c2667757b993f9ee8537a0673106c7f7a5e40d34719432d0a064a05674592cdab932fa83bfb33ca1e814f4597e5ca21153df1fcdf9ff2f

Malware Config

Targets

    • Target

      5c3e7afb933472823ff76245e3a6f1e94827da16c65f4c1f60b2574559bb7823

    • Size

      3.3MB

    • MD5

      24d138c8c647374dc46ebcf35144c887

    • SHA1

      8f3aba2d700df244557e624279093d03d35a7cc8

    • SHA256

      5c3e7afb933472823ff76245e3a6f1e94827da16c65f4c1f60b2574559bb7823

    • SHA512

      751ee9dd1f18517bc0c2667757b993f9ee8537a0673106c7f7a5e40d34719432d0a064a05674592cdab932fa83bfb33ca1e814f4597e5ca21153df1fcdf9ff2f

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

MITRE ATT&CK Matrix

Tasks