General
-
Target
12ed6d183cc130f8a7c33418013a05ffbec817a2981e987ef5931e0e9245d7c5
-
Size
5KB
-
Sample
220603-q993ysgee7
-
MD5
d9337ff3c22d2a4258890fd38c5e7d7f
-
SHA1
6dae55e6a58b612fedb42ebb73a77f9c4b932e27
-
SHA256
12ed6d183cc130f8a7c33418013a05ffbec817a2981e987ef5931e0e9245d7c5
-
SHA512
166d9dd0c11cc8d685868e976014938d1abfbb087485324f720b76002e44250309e618622461b6203ea6470dedec62002bea3bda32f4ebf7ef385c78327315ac
Static task
static1
Behavioral task
behavioral1
Sample
12ed6d183cc130f8a7c33418013a05ffbec817a2981e987ef5931e0e9245d7c5.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
12ed6d183cc130f8a7c33418013a05ffbec817a2981e987ef5931e0e9245d7c5.dll
Resource
win10v2004-20220414-en
Malware Config
Extracted
metasploit
windows/single_exec
Targets
-
-
Target
12ed6d183cc130f8a7c33418013a05ffbec817a2981e987ef5931e0e9245d7c5
-
Size
5KB
-
MD5
d9337ff3c22d2a4258890fd38c5e7d7f
-
SHA1
6dae55e6a58b612fedb42ebb73a77f9c4b932e27
-
SHA256
12ed6d183cc130f8a7c33418013a05ffbec817a2981e987ef5931e0e9245d7c5
-
SHA512
166d9dd0c11cc8d685868e976014938d1abfbb087485324f720b76002e44250309e618622461b6203ea6470dedec62002bea3bda32f4ebf7ef385c78327315ac
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Blocklisted process makes network request
-
Use of msiexec (install) with remote resource
-
Suspicious use of SetThreadContext
-