General
-
Target
b2f80c516207c691e18dd4a347146bee37d76e208a3745f6aa150dc4ff821336
-
Size
4KB
-
Sample
220625-jsegdsecc7
-
MD5
d1c71f80a7ca3d8fd6eb25afd8685e54
-
SHA1
e17de42aabf98e65fa3e1bb5b0ad748f319b4c71
-
SHA256
b2f80c516207c691e18dd4a347146bee37d76e208a3745f6aa150dc4ff821336
-
SHA512
2fb0cad6f4fb56a0c6078d4fe60044fa27918a9a3e412255111d90efeef528a5ae0de81b5273e21b0e54d024bf81c7eafe771055b152001a04ee11354b291d56
Static task
static1
Behavioral task
behavioral1
Sample
b2f80c516207c691e18dd4a347146bee37d76e208a3745f6aa150dc4ff821336.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
b2f80c516207c691e18dd4a347146bee37d76e208a3745f6aa150dc4ff821336.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
192.168.86.59:3790
Targets
-
-
Target
b2f80c516207c691e18dd4a347146bee37d76e208a3745f6aa150dc4ff821336
-
Size
4KB
-
MD5
d1c71f80a7ca3d8fd6eb25afd8685e54
-
SHA1
e17de42aabf98e65fa3e1bb5b0ad748f319b4c71
-
SHA256
b2f80c516207c691e18dd4a347146bee37d76e208a3745f6aa150dc4ff821336
-
SHA512
2fb0cad6f4fb56a0c6078d4fe60044fa27918a9a3e412255111d90efeef528a5ae0de81b5273e21b0e54d024bf81c7eafe771055b152001a04ee11354b291d56
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-