General
-
Target
8f343eb8c2c5e4a68c10a52c6dce60ad2b77e23a1fbc911b6cb0d7552dff5b41
-
Size
53KB
-
Sample
221205-pzezdsbb95
-
MD5
5feb792c104aeabc7ffbbcc25135e826
-
SHA1
e27f80b801efd609ea13da700dc6443365d29e17
-
SHA256
8f343eb8c2c5e4a68c10a52c6dce60ad2b77e23a1fbc911b6cb0d7552dff5b41
-
SHA512
4c35856071a25eb2435e4e94194df6e64518eb66b02948971b349a281553d7934be9468e9f4c681c32c40bb946ef3324376397357e03d10ac2f48d33c27e94eb
-
SSDEEP
1536:yRDv/y56VTjZ8BfynyMnGiL2I6GtQB1h:yHyyTj2BfMyMzy
Static task
static1
Behavioral task
behavioral1
Sample
8f343eb8c2c5e4a68c10a52c6dce60ad2b77e23a1fbc911b6cb0d7552dff5b41.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8f343eb8c2c5e4a68c10a52c6dce60ad2b77e23a1fbc911b6cb0d7552dff5b41.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
8f343eb8c2c5e4a68c10a52c6dce60ad2b77e23a1fbc911b6cb0d7552dff5b41
-
Size
53KB
-
MD5
5feb792c104aeabc7ffbbcc25135e826
-
SHA1
e27f80b801efd609ea13da700dc6443365d29e17
-
SHA256
8f343eb8c2c5e4a68c10a52c6dce60ad2b77e23a1fbc911b6cb0d7552dff5b41
-
SHA512
4c35856071a25eb2435e4e94194df6e64518eb66b02948971b349a281553d7934be9468e9f4c681c32c40bb946ef3324376397357e03d10ac2f48d33c27e94eb
-
SSDEEP
1536:yRDv/y56VTjZ8BfynyMnGiL2I6GtQB1h:yHyyTj2BfMyMzy
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Suspicious use of SetThreadContext
-