General
-
Target
3f6a60026e999c6449af154b55a81159b190fefe7658771d33677111d1bb5371
-
Size
264KB
-
Sample
221201-fk46asfd53
-
MD5
4d909f4075f050482a761d14db927f83
-
SHA1
bf076c0e3739d9a6e4efe4f76fb0b4c2169c8f29
-
SHA256
3f6a60026e999c6449af154b55a81159b190fefe7658771d33677111d1bb5371
-
SHA512
b4f23e462f388ffaeaa2cb254cdd1d8ee71f43a0e97afe25fa04e80b1412fcb4c3ec002135491aff2d4422b81c92a5755546389fdd952e7ac6cf470a84ba16e4
-
SSDEEP
3072:ccJeDtGvpN6ajL43fo47yp8JmUOnHJDLd0P/pP0oP0oP0oP0oP0oP0oP0oP0oP04:cWecpgy4hyiJmUOHNB
Static task
static1
Behavioral task
behavioral1
Sample
3f6a60026e999c6449af154b55a81159b190fefe7658771d33677111d1bb5371.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3f6a60026e999c6449af154b55a81159b190fefe7658771d33677111d1bb5371.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
3f6a60026e999c6449af154b55a81159b190fefe7658771d33677111d1bb5371
-
Size
264KB
-
MD5
4d909f4075f050482a761d14db927f83
-
SHA1
bf076c0e3739d9a6e4efe4f76fb0b4c2169c8f29
-
SHA256
3f6a60026e999c6449af154b55a81159b190fefe7658771d33677111d1bb5371
-
SHA512
b4f23e462f388ffaeaa2cb254cdd1d8ee71f43a0e97afe25fa04e80b1412fcb4c3ec002135491aff2d4422b81c92a5755546389fdd952e7ac6cf470a84ba16e4
-
SSDEEP
3072:ccJeDtGvpN6ajL43fo47yp8JmUOnHJDLd0P/pP0oP0oP0oP0oP0oP0oP0oP0oP04:cWecpgy4hyiJmUOHNB
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies firewall policy service
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-