General
-
Target
c5c39cbc727553f82ca5a18bf617a676cee8e4a60de22b80fbb2873f81e997fc
-
Size
46KB
-
Sample
221201-jxqp8ahd47
-
MD5
b48c2d67746e914b77d82680439259ce
-
SHA1
f109cbac9552ea523a3aa91f6a1ba37ffeada30f
-
SHA256
c5c39cbc727553f82ca5a18bf617a676cee8e4a60de22b80fbb2873f81e997fc
-
SHA512
d161561e2a0a195a1cc86d953fbb25e2075225a13c39f11f6d8d7b1e63b115f757170c1a7b95fac1b26d0a92f0a5df59e9f223095d24ecb34a5f1a2b52654d4f
-
SSDEEP
768:e2h7whenc4GleBqAbdKPlpBgOQteRXIOu3NrcEiMZQgY8AhUqQKKLO41mmRYTckB:n7u+IAbdKdpBgOpaOmNgEJQgY/QTO4MZ
Static task
static1
Behavioral task
behavioral1
Sample
c5c39cbc727553f82ca5a18bf617a676cee8e4a60de22b80fbb2873f81e997fc.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c5c39cbc727553f82ca5a18bf617a676cee8e4a60de22b80fbb2873f81e997fc.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
c5c39cbc727553f82ca5a18bf617a676cee8e4a60de22b80fbb2873f81e997fc
-
Size
46KB
-
MD5
b48c2d67746e914b77d82680439259ce
-
SHA1
f109cbac9552ea523a3aa91f6a1ba37ffeada30f
-
SHA256
c5c39cbc727553f82ca5a18bf617a676cee8e4a60de22b80fbb2873f81e997fc
-
SHA512
d161561e2a0a195a1cc86d953fbb25e2075225a13c39f11f6d8d7b1e63b115f757170c1a7b95fac1b26d0a92f0a5df59e9f223095d24ecb34a5f1a2b52654d4f
-
SSDEEP
768:e2h7whenc4GleBqAbdKPlpBgOQteRXIOu3NrcEiMZQgY8AhUqQKKLO41mmRYTckB:n7u+IAbdKdpBgOpaOmNgEJQgY/QTO4MZ
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Adds Run key to start application
-