General
-
Target
58208d40b351d29abafbf89b8ad66e98013e921f7758f907efb75f8e615a84c8
-
Size
5KB
-
Sample
220523-z5c24acaem
-
MD5
628d6dca5e9ff8f515dec35a7e289e24
-
SHA1
3f46896c584f5cf73bfdeb310d625e20c5e4e888
-
SHA256
58208d40b351d29abafbf89b8ad66e98013e921f7758f907efb75f8e615a84c8
-
SHA512
14c1d63a3ca384def9837f9ca95720dec66759e13cd34112921ef5be5847540ad5913e25f83d533577833cc8c1c78e36ce04dc0ff2a4caa63382e69b10ee832a
Static task
static1
Behavioral task
behavioral1
Sample
58208d40b351d29abafbf89b8ad66e98013e921f7758f907efb75f8e615a84c8.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
58208d40b351d29abafbf89b8ad66e98013e921f7758f907efb75f8e615a84c8.dll
Resource
win10v2004-20220414-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Targets
-
-
Target
58208d40b351d29abafbf89b8ad66e98013e921f7758f907efb75f8e615a84c8
-
Size
5KB
-
MD5
628d6dca5e9ff8f515dec35a7e289e24
-
SHA1
3f46896c584f5cf73bfdeb310d625e20c5e4e888
-
SHA256
58208d40b351d29abafbf89b8ad66e98013e921f7758f907efb75f8e615a84c8
-
SHA512
14c1d63a3ca384def9837f9ca95720dec66759e13cd34112921ef5be5847540ad5913e25f83d533577833cc8c1c78e36ce04dc0ff2a4caa63382e69b10ee832a
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Suspicious use of SetThreadContext
-