General
-
Target
530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476
-
Size
84KB
-
Sample
220717-beax2saegj
-
MD5
8fd13283ab7be9feda213f1046c894a1
-
SHA1
cde8940b8592584606259377a416cba1fe14dbbe
-
SHA256
530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476
-
SHA512
8a0bcc97ee61dc737ca667848618203b95be9a2666980275948c813db365c1c379f50b95218b4175be835f256bc6b032eac4b06ca9ec235ddefe31ccb2af8c87
Static task
static1
Behavioral task
behavioral1
Sample
530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476
-
Size
84KB
-
MD5
8fd13283ab7be9feda213f1046c894a1
-
SHA1
cde8940b8592584606259377a416cba1fe14dbbe
-
SHA256
530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476
-
SHA512
8a0bcc97ee61dc737ca667848618203b95be9a2666980275948c813db365c1c379f50b95218b4175be835f256bc6b032eac4b06ca9ec235ddefe31ccb2af8c87
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-