General
-
Target
http://51.79.49,174/
-
Sample
230609-tp6ftacf25
Score
10/10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://51.79.49,174/
Resource
win10v2004-20230220-es
13 signatures
600 seconds
Malware Config
Extracted
Family
metasploit
Version
windows/shell_reverse_tcp
C2
51.79.49.174:443
Targets
-
-
Target
http://51.79.49,174/
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-