General
-
Target
tmp
-
Size
72KB
-
Sample
220614-st7zrsfbcj
-
MD5
04cf8f97769f71408280158795d8e309
-
SHA1
2c26c24ab7b02267ef6bd7aa71cbbccfd07ddbff
-
SHA256
cfd3d68fdcdcb3e629ecee1612d87a3b69dca38e266dbad2f6e71859254f2a73
-
SHA512
3d07e553d00111624e9993414dece4c6fba3428eeaa4dc042ca4dea5b024eb8f201002a812c3bef26aa170ebeed98735a8708dc112f89a96567fa3db29dafd18
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
10.211.55.2:3333
Targets
-
-
Target
tmp
-
Size
72KB
-
MD5
04cf8f97769f71408280158795d8e309
-
SHA1
2c26c24ab7b02267ef6bd7aa71cbbccfd07ddbff
-
SHA256
cfd3d68fdcdcb3e629ecee1612d87a3b69dca38e266dbad2f6e71859254f2a73
-
SHA512
3d07e553d00111624e9993414dece4c6fba3428eeaa4dc042ca4dea5b024eb8f201002a812c3bef26aa170ebeed98735a8708dc112f89a96567fa3db29dafd18
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-