General
-
Target
cf6fb91e9afe3c2c07ffef84e81252ed1ccec6f3ef0722a0c570a7a015fbf84b
-
Size
72KB
-
Sample
220524-rws3ysaafp
-
MD5
91ab686eac1494d59f5afbee3beb7641
-
SHA1
ef69a95c7a72421cb3ffd1174b40c10d3e3c4410
-
SHA256
cf6fb91e9afe3c2c07ffef84e81252ed1ccec6f3ef0722a0c570a7a015fbf84b
-
SHA512
412b84e63f6ba9862da6101b665a76e65e1f27d481d8672890818d541e52fbab720dd9bbe2cc7ae601b755c38bffd21a71c4aa1052c1da169056388170f8f0ed
Static task
static1
Behavioral task
behavioral1
Sample
cf6fb91e9afe3c2c07ffef84e81252ed1ccec6f3ef0722a0c570a7a015fbf84b.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
cf6fb91e9afe3c2c07ffef84e81252ed1ccec6f3ef0722a0c570a7a015fbf84b.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
185.81.157.183:4444
Targets
-
-
Target
cf6fb91e9afe3c2c07ffef84e81252ed1ccec6f3ef0722a0c570a7a015fbf84b
-
Size
72KB
-
MD5
91ab686eac1494d59f5afbee3beb7641
-
SHA1
ef69a95c7a72421cb3ffd1174b40c10d3e3c4410
-
SHA256
cf6fb91e9afe3c2c07ffef84e81252ed1ccec6f3ef0722a0c570a7a015fbf84b
-
SHA512
412b84e63f6ba9862da6101b665a76e65e1f27d481d8672890818d541e52fbab720dd9bbe2cc7ae601b755c38bffd21a71c4aa1052c1da169056388170f8f0ed
Score1/10 -