General
-
Target
b11fcb34cd8188d791893c7b83bdd23858ab7a3499374a1b898b838781dc946b
-
Size
158KB
-
Sample
221003-ehtq4sgdhm
-
MD5
60fe02784d6c0fb54306dea15e1eb980
-
SHA1
ab942bb6e3f103f73bbcf886b0769847d8a1bf61
-
SHA256
b11fcb34cd8188d791893c7b83bdd23858ab7a3499374a1b898b838781dc946b
-
SHA512
4efc7594e061fb623029a8b63cb97c99d7c2162b63c49e4ec64c4b8c2588044d8766215ab0339404cf9326294820a9ecba0ff86b608c2b5a325a651f13f3cf72
-
SSDEEP
3072:lJR0uD7I+HrypUZa4l/pqWWQVxBCZq58GwrsXx4Mx:lJyuXI+8UZamlj581Ih4Mx
Behavioral task
behavioral1
Sample
b11fcb34cd8188d791893c7b83bdd23858ab7a3499374a1b898b838781dc946b.exe
Resource
win7-20220901-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
b11fcb34cd8188d791893c7b83bdd23858ab7a3499374a1b898b838781dc946b
-
Size
158KB
-
MD5
60fe02784d6c0fb54306dea15e1eb980
-
SHA1
ab942bb6e3f103f73bbcf886b0769847d8a1bf61
-
SHA256
b11fcb34cd8188d791893c7b83bdd23858ab7a3499374a1b898b838781dc946b
-
SHA512
4efc7594e061fb623029a8b63cb97c99d7c2162b63c49e4ec64c4b8c2588044d8766215ab0339404cf9326294820a9ecba0ff86b608c2b5a325a651f13f3cf72
-
SSDEEP
3072:lJR0uD7I+HrypUZa4l/pqWWQVxBCZq58GwrsXx4Mx:lJyuXI+8UZamlj581Ih4Mx
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies firewall policy service
-
Drops file in System32 directory
-