General
-
Target
74fb788e4405f8a8aeba15f88cf316479548f9727a6f9a75ec8def34a530f75e
-
Size
216KB
-
Sample
221129-jkz35ach5v
-
MD5
e700d4f113b0463aadfcf94b13caa67a
-
SHA1
097326fea43754383db1092e82631cb5b557c73a
-
SHA256
74fb788e4405f8a8aeba15f88cf316479548f9727a6f9a75ec8def34a530f75e
-
SHA512
5452da056bc2bcfcf223140a2500e512b8a53e1237a6b006100644fa37bb94d0f0971a2643cd25b8969222e56ae939dc71a03f7d3215ae2f3c6920202d6c3b6b
-
SSDEEP
3072:zHS9aUqpGuDrQ4H+PBV/d+Ql38oAdubOd9cfeBiguSUIVWyJKMdqd0iQMqN8GQc/:zHdPXuMQlDSubOHrigZUqDJ00D6GQH
Static task
static1
Behavioral task
behavioral1
Sample
74fb788e4405f8a8aeba15f88cf316479548f9727a6f9a75ec8def34a530f75e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
74fb788e4405f8a8aeba15f88cf316479548f9727a6f9a75ec8def34a530f75e.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/shell_reverse_tcp
192.168.86.129:443
Targets
-
-
Target
74fb788e4405f8a8aeba15f88cf316479548f9727a6f9a75ec8def34a530f75e
-
Size
216KB
-
MD5
e700d4f113b0463aadfcf94b13caa67a
-
SHA1
097326fea43754383db1092e82631cb5b557c73a
-
SHA256
74fb788e4405f8a8aeba15f88cf316479548f9727a6f9a75ec8def34a530f75e
-
SHA512
5452da056bc2bcfcf223140a2500e512b8a53e1237a6b006100644fa37bb94d0f0971a2643cd25b8969222e56ae939dc71a03f7d3215ae2f3c6920202d6c3b6b
-
SSDEEP
3072:zHS9aUqpGuDrQ4H+PBV/d+Ql38oAdubOd9cfeBiguSUIVWyJKMdqd0iQMqN8GQc/:zHdPXuMQlDSubOHrigZUqDJ00D6GQH
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-