General
-
Target
5e2a0e82cf16b17ee9604f394914ab14ad04d0ee4ea533e98b1e32170cf11efb
-
Size
37KB
-
Sample
220708-v9nxyacfar
-
MD5
2539e15bb5d8dac8f084e891530da8be
-
SHA1
6e36a510d61f7afddf089fc3f10171a127fba292
-
SHA256
5e2a0e82cf16b17ee9604f394914ab14ad04d0ee4ea533e98b1e32170cf11efb
-
SHA512
2dd16cc9f0dbcd64b47f5139ff47a1c63e9c446c59b239073af856978a552c719799678a90bb53ff57e60d69f9b024883527481a1e4c50a5996671a9ee0775d3
Static task
static1
Behavioral task
behavioral1
Sample
5e2a0e82cf16b17ee9604f394914ab14ad04d0ee4ea533e98b1e32170cf11efb.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
5e2a0e82cf16b17ee9604f394914ab14ad04d0ee4ea533e98b1e32170cf11efb.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/shell_bind_tcp
Targets
-
-
Target
5e2a0e82cf16b17ee9604f394914ab14ad04d0ee4ea533e98b1e32170cf11efb
-
Size
37KB
-
MD5
2539e15bb5d8dac8f084e891530da8be
-
SHA1
6e36a510d61f7afddf089fc3f10171a127fba292
-
SHA256
5e2a0e82cf16b17ee9604f394914ab14ad04d0ee4ea533e98b1e32170cf11efb
-
SHA512
2dd16cc9f0dbcd64b47f5139ff47a1c63e9c446c59b239073af856978a552c719799678a90bb53ff57e60d69f9b024883527481a1e4c50a5996671a9ee0775d3
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-