General
-
Target
3c15051a084a44625da869f347945191adea3ba8ed8c6830e92add6a2f0b4cd3
-
Size
5KB
-
Sample
220703-klcvnaeed6
-
MD5
4b128c58a8afdc3a838018142fdb4bea
-
SHA1
73a1f572471d6cb23de20258d3db4860f82cac1c
-
SHA256
3c15051a084a44625da869f347945191adea3ba8ed8c6830e92add6a2f0b4cd3
-
SHA512
3b1a1afa0729ed7d4d5f1c1fb8188e4ee007ad353a68255cb110a7940719d827ea9fc9cffd9074261c2d308f50c6ef5c324672188d33c5f8c56c3d83a6656ede
Static task
static1
Behavioral task
behavioral1
Sample
3c15051a084a44625da869f347945191adea3ba8ed8c6830e92add6a2f0b4cd3.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3c15051a084a44625da869f347945191adea3ba8ed8c6830e92add6a2f0b4cd3.dll
Resource
win10v2004-20220414-en
Malware Config
Extracted
metasploit
windows/exec
Targets
-
-
Target
3c15051a084a44625da869f347945191adea3ba8ed8c6830e92add6a2f0b4cd3
-
Size
5KB
-
MD5
4b128c58a8afdc3a838018142fdb4bea
-
SHA1
73a1f572471d6cb23de20258d3db4860f82cac1c
-
SHA256
3c15051a084a44625da869f347945191adea3ba8ed8c6830e92add6a2f0b4cd3
-
SHA512
3b1a1afa0729ed7d4d5f1c1fb8188e4ee007ad353a68255cb110a7940719d827ea9fc9cffd9074261c2d308f50c6ef5c324672188d33c5f8c56c3d83a6656ede
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-