General
-
Target
a31c17a0_by_Libranalysis
-
Size
156KB
-
Sample
210509-p9jpmjx3ts
-
MD5
a31c17a0a4a0d3caf0472c747c890d1a
-
SHA1
2022484abc139e3643dcf2e1f29a0e52564e738f
-
SHA256
0685a699fb13d6bc99b6aee35381acf77b00155d56e7448a300aa308fd07598c
-
SHA512
b551814e1056a96298fab0de7bdc3d746ff7db07cdb0d3b5dc39ee8fc260e03de8b7b329226ce8dbc50bcd809bb8d335fd0de7f2eddf5748d1ed990b5ff0af14
Static task
static1
Behavioral task
behavioral1
Sample
a31c17a0_by_Libranalysis.msi
Resource
win7v20210408
Behavioral task
behavioral2
Sample
a31c17a0_by_Libranalysis.msi
Resource
win10v20210410
Malware Config
Extracted
metasploit
windows/reverse_tcp
3.141.210.37:18573
Targets
-
-
Target
a31c17a0_by_Libranalysis
-
Size
156KB
-
MD5
a31c17a0a4a0d3caf0472c747c890d1a
-
SHA1
2022484abc139e3643dcf2e1f29a0e52564e738f
-
SHA256
0685a699fb13d6bc99b6aee35381acf77b00155d56e7448a300aa308fd07598c
-
SHA512
b551814e1056a96298fab0de7bdc3d746ff7db07cdb0d3b5dc39ee8fc260e03de8b7b329226ce8dbc50bcd809bb8d335fd0de7f2eddf5748d1ed990b5ff0af14
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-