General
-
Target
f3c45923d187a02ffac9469f65edcace142b0cefc85e9bd536900ea74a32e9e8
-
Size
52KB
-
Sample
221206-yesjesbb5x
-
MD5
1fdd45c21dc7cf497867091f245e4a98
-
SHA1
98aa747bd12826b61272347b50c6af40ed9e0f4c
-
SHA256
f3c45923d187a02ffac9469f65edcace142b0cefc85e9bd536900ea74a32e9e8
-
SHA512
fcae80f6da193bfa533762708c6a1614c9b101050edcee9ff5ea39505e00aab954a283fd04d8068994d288e8086bfa1e8b108f4a3eb27694b6fe5d9c40d43e99
-
SSDEEP
768:RKMBElKgOTqFQ98bPQ0Q+nFLNvrZ+VafZr1vXX4JEmVuRQBDYIsz8X79T3v8PXIF:RuO+aSa0p1+UBdgQQB8J8X7hSYg2C8
Static task
static1
Behavioral task
behavioral1
Sample
f3c45923d187a02ffac9469f65edcace142b0cefc85e9bd536900ea74a32e9e8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f3c45923d187a02ffac9469f65edcace142b0cefc85e9bd536900ea74a32e9e8.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
f3c45923d187a02ffac9469f65edcace142b0cefc85e9bd536900ea74a32e9e8
-
Size
52KB
-
MD5
1fdd45c21dc7cf497867091f245e4a98
-
SHA1
98aa747bd12826b61272347b50c6af40ed9e0f4c
-
SHA256
f3c45923d187a02ffac9469f65edcace142b0cefc85e9bd536900ea74a32e9e8
-
SHA512
fcae80f6da193bfa533762708c6a1614c9b101050edcee9ff5ea39505e00aab954a283fd04d8068994d288e8086bfa1e8b108f4a3eb27694b6fe5d9c40d43e99
-
SSDEEP
768:RKMBElKgOTqFQ98bPQ0Q+nFLNvrZ+VafZr1vXX4JEmVuRQBDYIsz8X79T3v8PXIF:RuO+aSa0p1+UBdgQQB8J8X7hSYg2C8
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-