General
-
Target
2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4
-
Size
107KB
-
Sample
221124-bfxs7scb7y
-
MD5
274a992b90460b31dfb26595a69606d1
-
SHA1
9a76f9be0787dae4730f6577beb93b649ce5b9ea
-
SHA256
2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4
-
SHA512
e318ef892a5334799cfe1b0e68a14db773700313215f7838503aa81c70cebfa6b57c7fbf2eeff84e2cc7fd1c1ef530f7847401c756bfe77b87b469a2c55ae28e
-
SSDEEP
3072:GfgUXWFKNlw1bbhJltZrpRV7Nwh2Ep69t96ghyP:igUXWF+m1bbJthpz7Nwh2GK6gm
Static task
static1
Behavioral task
behavioral1
Sample
2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4
-
Size
107KB
-
MD5
274a992b90460b31dfb26595a69606d1
-
SHA1
9a76f9be0787dae4730f6577beb93b649ce5b9ea
-
SHA256
2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4
-
SHA512
e318ef892a5334799cfe1b0e68a14db773700313215f7838503aa81c70cebfa6b57c7fbf2eeff84e2cc7fd1c1ef530f7847401c756bfe77b87b469a2c55ae28e
-
SSDEEP
3072:GfgUXWFKNlw1bbhJltZrpRV7Nwh2Ep69t96ghyP:igUXWF+m1bbJthpz7Nwh2GK6gm
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Adds policy Run key to start application
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-