General
-
Target
4564ca0c436fde9e76f5fa65cbcf483adf1fbfa3d7369b7bb67d2c95457f6bc5
-
Size
80KB
-
Sample
220708-kt6spsccb2
-
MD5
cb204f1ca7725d54847b1dc0bad7c6dd
-
SHA1
eb5916c3301d3c0c1d881484c1bcef090f65bf30
-
SHA256
4564ca0c436fde9e76f5fa65cbcf483adf1fbfa3d7369b7bb67d2c95457f6bc5
-
SHA512
bc8e03da8b23160ea6fc40267063831b30e10f19dc357b4c381bf3ce196a60686123528f849cf0f525483818b9fd26e5dbadf6fb5574a5eb198ed9943213c91c
Static task
static1
Behavioral task
behavioral1
Sample
4564ca0c436fde9e76f5fa65cbcf483adf1fbfa3d7369b7bb67d2c95457f6bc5.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4564ca0c436fde9e76f5fa65cbcf483adf1fbfa3d7369b7bb67d2c95457f6bc5.dll
Resource
win10v2004-20220414-en
Malware Config
Extracted
metasploit
windows/download_exec
http://powershell.services:443/components/massaction.png
Targets
-
-
Target
4564ca0c436fde9e76f5fa65cbcf483adf1fbfa3d7369b7bb67d2c95457f6bc5
-
Size
80KB
-
MD5
cb204f1ca7725d54847b1dc0bad7c6dd
-
SHA1
eb5916c3301d3c0c1d881484c1bcef090f65bf30
-
SHA256
4564ca0c436fde9e76f5fa65cbcf483adf1fbfa3d7369b7bb67d2c95457f6bc5
-
SHA512
bc8e03da8b23160ea6fc40267063831b30e10f19dc357b4c381bf3ce196a60686123528f849cf0f525483818b9fd26e5dbadf6fb5574a5eb198ed9943213c91c
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-