General
-
Target
85f12250740d1be768cf62cb174e5bc1b5e4fb986115f4c1fb226c197f4c140c
-
Size
2.0MB
-
Sample
220708-vtzdqsbgcl
-
MD5
907653218f98010e9dd2759ca94a9556
-
SHA1
bc0e9c860734b67ac3c7cda7a4a174e379fdefa3
-
SHA256
85f12250740d1be768cf62cb174e5bc1b5e4fb986115f4c1fb226c197f4c140c
-
SHA512
e9da5d9ad778c61842e8d8255caebd62019257c27f23b7262b3f773d3b870a4c1bfc024e5758397918dad339c8e0ed6bb02ee8aed8294f782931beed4af97814
Static task
static1
Behavioral task
behavioral1
Sample
85f12250740d1be768cf62cb174e5bc1b5e4fb986115f4c1fb226c197f4c140c.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
85f12250740d1be768cf62cb174e5bc1b5e4fb986115f4c1fb226c197f4c140c.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
metasploit
metasploit_stager
138.68.101.124:4444
Targets
-
-
Target
85f12250740d1be768cf62cb174e5bc1b5e4fb986115f4c1fb226c197f4c140c
-
Size
2.0MB
-
MD5
907653218f98010e9dd2759ca94a9556
-
SHA1
bc0e9c860734b67ac3c7cda7a4a174e379fdefa3
-
SHA256
85f12250740d1be768cf62cb174e5bc1b5e4fb986115f4c1fb226c197f4c140c
-
SHA512
e9da5d9ad778c61842e8d8255caebd62019257c27f23b7262b3f773d3b870a4c1bfc024e5758397918dad339c8e0ed6bb02ee8aed8294f782931beed4af97814
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-