General
-
Target
17b3d6656dd5a00b260a918ea01843d9eacd99edafb7e7709082aa526d69c796
-
Size
124KB
-
Sample
220724-yg5a1aedaj
-
MD5
156064a8746202f13f6b1c2a7404272a
-
SHA1
48e7636fc4ea0e3170a5de5d979961adfec8f612
-
SHA256
17b3d6656dd5a00b260a918ea01843d9eacd99edafb7e7709082aa526d69c796
-
SHA512
0947e62030e5ab32dcc1c87d47f3d4244722139f7d7948f9410bcf0ed545906fa1ec31563a4bb5fdc5329ce0962a97fc336631ef9d5bf397a75352033a6bf21f
Behavioral task
behavioral1
Sample
17b3d6656dd5a00b260a918ea01843d9eacd99edafb7e7709082aa526d69c796.msi
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
17b3d6656dd5a00b260a918ea01843d9eacd99edafb7e7709082aa526d69c796.msi
Resource
win10v2004-20220721-en
Malware Config
Extracted
metasploit
windows/reverse_tcp
158.69.130.136:8443
Targets
-
-
Target
17b3d6656dd5a00b260a918ea01843d9eacd99edafb7e7709082aa526d69c796
-
Size
124KB
-
MD5
156064a8746202f13f6b1c2a7404272a
-
SHA1
48e7636fc4ea0e3170a5de5d979961adfec8f612
-
SHA256
17b3d6656dd5a00b260a918ea01843d9eacd99edafb7e7709082aa526d69c796
-
SHA512
0947e62030e5ab32dcc1c87d47f3d4244722139f7d7948f9410bcf0ed545906fa1ec31563a4bb5fdc5329ce0962a97fc336631ef9d5bf397a75352033a6bf21f
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-