General
-
Target
405038bb905e5740fb8363dfdc8b03a7d40d7ea80715bb5697a65a0fbcd45119
-
Size
1.3MB
-
Sample
221127-hj53bafg85
-
MD5
f721d46e0049e7604741f53f79fe39a3
-
SHA1
2bb22da15b74e26de1ffecb81583c403f1893257
-
SHA256
405038bb905e5740fb8363dfdc8b03a7d40d7ea80715bb5697a65a0fbcd45119
-
SHA512
89bcac2c72bddc50922381b0a92dcda4a1c2ee26dd8830393a983c19f804096792aa404ff786d5cc7928cae77c448c398c4606b6f869951f92e32931a933cfe3
-
SSDEEP
24576:R0FGMqzFkMiE4nAcQB2kWf65NShgDAzkxFPh3kEpS:e+Fk+MHn6/SKDIkxxh3
Static task
static1
Behavioral task
behavioral1
Sample
405038bb905e5740fb8363dfdc8b03a7d40d7ea80715bb5697a65a0fbcd45119.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
405038bb905e5740fb8363dfdc8b03a7d40d7ea80715bb5697a65a0fbcd45119.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Targets
-
-
Target
405038bb905e5740fb8363dfdc8b03a7d40d7ea80715bb5697a65a0fbcd45119
-
Size
1.3MB
-
MD5
f721d46e0049e7604741f53f79fe39a3
-
SHA1
2bb22da15b74e26de1ffecb81583c403f1893257
-
SHA256
405038bb905e5740fb8363dfdc8b03a7d40d7ea80715bb5697a65a0fbcd45119
-
SHA512
89bcac2c72bddc50922381b0a92dcda4a1c2ee26dd8830393a983c19f804096792aa404ff786d5cc7928cae77c448c398c4606b6f869951f92e32931a933cfe3
-
SSDEEP
24576:R0FGMqzFkMiE4nAcQB2kWf65NShgDAzkxFPh3kEpS:e+Fk+MHn6/SKDIkxxh3
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-