General
-
Target
shell444.msi
-
Size
156KB
-
Sample
230603-gf14hsfg22
-
MD5
237333fa0ad0a1535befa1ed7a4e227b
-
SHA1
d5ee5ea16376b64828d148f3f1a15be5154cf771
-
SHA256
138810d2f0a3b9654c3ee32406759db2544b6d916f09e09e5c0e255d44b4b987
-
SHA512
ca2ee8047a39cbc467ccf0fc728d075452ab21351daaabcb9b4c4177104645f480353734b1ff5302b0f7d6589933c41c7b714acf355ac9756935aecb76035d76
-
SSDEEP
3072:v7KOlU30lIJxWiiN3t5seAc/Ue0Nc8QsC:hlU30lIJdSt54c/f0Nc8Qs
Behavioral task
behavioral1
Sample
shell444.msi
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
shell444.msi
Resource
win10v2004-20230220-en
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
192.168.49.123:6666
Targets
-
-
Target
shell444.msi
-
Size
156KB
-
MD5
237333fa0ad0a1535befa1ed7a4e227b
-
SHA1
d5ee5ea16376b64828d148f3f1a15be5154cf771
-
SHA256
138810d2f0a3b9654c3ee32406759db2544b6d916f09e09e5c0e255d44b4b987
-
SHA512
ca2ee8047a39cbc467ccf0fc728d075452ab21351daaabcb9b4c4177104645f480353734b1ff5302b0f7d6589933c41c7b714acf355ac9756935aecb76035d76
-
SSDEEP
3072:v7KOlU30lIJxWiiN3t5seAc/Ue0Nc8QsC:hlU30lIJdSt54c/f0Nc8Qs
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-