General
-
Target
4a90cac96c04e3cf0b797290dbcc1403d36fd6a6fa26e87c865283ec4086621b
-
Size
79KB
-
Sample
220712-p26j5adfc4
-
MD5
c82d0e4f5eab0bc5c26f79628cbef4fc
-
SHA1
68e68a909a04803528d156b4705567164c221270
-
SHA256
4a90cac96c04e3cf0b797290dbcc1403d36fd6a6fa26e87c865283ec4086621b
-
SHA512
8a272a263ce742b84c1a99ae5073a735c71381257382811914f995aaf7f04d24bff669116786b113a9b2c6ca5400523acb7a69fa89d2f135af593673055ead8a
Static task
static1
Behavioral task
behavioral1
Sample
4a90cac96c04e3cf0b797290dbcc1403d36fd6a6fa26e87c865283ec4086621b.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4a90cac96c04e3cf0b797290dbcc1403d36fd6a6fa26e87c865283ec4086621b.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
4a90cac96c04e3cf0b797290dbcc1403d36fd6a6fa26e87c865283ec4086621b
-
Size
79KB
-
MD5
c82d0e4f5eab0bc5c26f79628cbef4fc
-
SHA1
68e68a909a04803528d156b4705567164c221270
-
SHA256
4a90cac96c04e3cf0b797290dbcc1403d36fd6a6fa26e87c865283ec4086621b
-
SHA512
8a272a263ce742b84c1a99ae5073a735c71381257382811914f995aaf7f04d24bff669116786b113a9b2c6ca5400523acb7a69fa89d2f135af593673055ead8a
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Suspicious use of SetThreadContext
-