General
-
Target
rundll32.exe
-
Size
72KB
-
Sample
220523-t7xlmaaeap
-
MD5
0ae6801746fc951ea748bd6fcebd7ea4
-
SHA1
154145167949420056d7a1566740ff99b2765199
-
SHA256
cbae182671c1d12bb0f548ff686b68101704751a1b592a12482a3526ae043558
-
SHA512
6bc8f76711f0a0a85327a4b57a50cd2cdc47de0419d7bd4971a0db7fedcb572b8bb698620367ee331a38a37345ec261ea1956e66f406eb64f4544fcf87454572
Static task
static1
Behavioral task
behavioral1
Sample
rundll32.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
rundll32.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
metasploit
windows/reverse_tcp
3.19.130.43:14610
Extracted
metasploit
encoder/shikata_ga_nai
Targets
-
-
Target
rundll32.exe
-
Size
72KB
-
MD5
0ae6801746fc951ea748bd6fcebd7ea4
-
SHA1
154145167949420056d7a1566740ff99b2765199
-
SHA256
cbae182671c1d12bb0f548ff686b68101704751a1b592a12482a3526ae043558
-
SHA512
6bc8f76711f0a0a85327a4b57a50cd2cdc47de0419d7bd4971a0db7fedcb572b8bb698620367ee331a38a37345ec261ea1956e66f406eb64f4544fcf87454572
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies boot configuration data using bcdedit
-
Adds Run key to start application
-