General
-
Target
1b845b30483d9a3fa395d610f3f458b90134f8d461657ac97d68fa5cb8df06c7
-
Size
297KB
-
Sample
220607-w5nbaagah2
-
MD5
5303cb67747f5acf1f784b3722946037
-
SHA1
bf6fe9cbae47d4ce27fc5012897b95a0bda2cd1a
-
SHA256
1b845b30483d9a3fa395d610f3f458b90134f8d461657ac97d68fa5cb8df06c7
-
SHA512
5eea1c89d1bb2655ee84d283260c4b808b21e04094b9a599a425f147da67d41db8232de6423df888fbc892e24625e7ef39d814b72d15d5401182583ed5ac3aa1
Static task
static1
Behavioral task
behavioral1
Sample
1b845b30483d9a3fa395d610f3f458b90134f8d461657ac97d68fa5cb8df06c7.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1b845b30483d9a3fa395d610f3f458b90134f8d461657ac97d68fa5cb8df06c7.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
1b845b30483d9a3fa395d610f3f458b90134f8d461657ac97d68fa5cb8df06c7
-
Size
297KB
-
MD5
5303cb67747f5acf1f784b3722946037
-
SHA1
bf6fe9cbae47d4ce27fc5012897b95a0bda2cd1a
-
SHA256
1b845b30483d9a3fa395d610f3f458b90134f8d461657ac97d68fa5cb8df06c7
-
SHA512
5eea1c89d1bb2655ee84d283260c4b808b21e04094b9a599a425f147da67d41db8232de6423df888fbc892e24625e7ef39d814b72d15d5401182583ed5ac3aa1
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-