General
-
Target
b3e84849ffabbc99bfbf6158c75499b6ab65604f82b97d903f696e4b55ba1d52
-
Size
217KB
-
Sample
221130-2zmqfsch27
-
MD5
bfba50b097fe03614f5dbf25af42e8ee
-
SHA1
620ec8316dc5712da04df439142b745a854de544
-
SHA256
b3e84849ffabbc99bfbf6158c75499b6ab65604f82b97d903f696e4b55ba1d52
-
SHA512
9491b7ca6f28780d24ca97cd8a77d0b0bd3d31afb50c7835c87b85cc3d27d797fe44455fe6a6dbb47605b3f2477848bf829338cea2fbac40f788066c7f3b15a5
-
SSDEEP
6144:rke5lTl+F2HpEHx0zTD/rUom0+XLT3rqB8fI:rd5xlzpE6PmZ3c
Behavioral task
behavioral1
Sample
b3e84849ffabbc99bfbf6158c75499b6ab65604f82b97d903f696e4b55ba1d52.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b3e84849ffabbc99bfbf6158c75499b6ab65604f82b97d903f696e4b55ba1d52.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/shell_reverse_tcp
192.168.0.10:123
Targets
-
-
Target
b3e84849ffabbc99bfbf6158c75499b6ab65604f82b97d903f696e4b55ba1d52
-
Size
217KB
-
MD5
bfba50b097fe03614f5dbf25af42e8ee
-
SHA1
620ec8316dc5712da04df439142b745a854de544
-
SHA256
b3e84849ffabbc99bfbf6158c75499b6ab65604f82b97d903f696e4b55ba1d52
-
SHA512
9491b7ca6f28780d24ca97cd8a77d0b0bd3d31afb50c7835c87b85cc3d27d797fe44455fe6a6dbb47605b3f2477848bf829338cea2fbac40f788066c7f3b15a5
-
SSDEEP
6144:rke5lTl+F2HpEHx0zTD/rUom0+XLT3rqB8fI:rd5xlzpE6PmZ3c
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-