General

  • Target

    4a90cac96c04e3cf0b797290dbcc1403d36fd6a6fa26e87c865283ec4086621b

  • Size

    79KB

  • Sample

    220712-p26j5adfc4

  • MD5

    c82d0e4f5eab0bc5c26f79628cbef4fc

  • SHA1

    68e68a909a04803528d156b4705567164c221270

  • SHA256

    4a90cac96c04e3cf0b797290dbcc1403d36fd6a6fa26e87c865283ec4086621b

  • SHA512

    8a272a263ce742b84c1a99ae5073a735c71381257382811914f995aaf7f04d24bff669116786b113a9b2c6ca5400523acb7a69fa89d2f135af593673055ead8a

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      4a90cac96c04e3cf0b797290dbcc1403d36fd6a6fa26e87c865283ec4086621b

    • Size

      79KB

    • MD5

      c82d0e4f5eab0bc5c26f79628cbef4fc

    • SHA1

      68e68a909a04803528d156b4705567164c221270

    • SHA256

      4a90cac96c04e3cf0b797290dbcc1403d36fd6a6fa26e87c865283ec4086621b

    • SHA512

      8a272a263ce742b84c1a99ae5073a735c71381257382811914f995aaf7f04d24bff669116786b113a9b2c6ca5400523acb7a69fa89d2f135af593673055ead8a

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks