General
-
Target
c.ps1
-
Size
949B
-
Sample
230721-v512psgc9z
-
MD5
3ddd346e351a6f8403679df34db1f5a2
-
SHA1
500e8abf1f075d06ef5a60648b9c866bfa816798
-
SHA256
79a1d293787ec7364bd0749ee4bf817cadd49255ed82075b091d84cc6e005e1b
-
SHA512
6e0d790ba5d55e9f43defd85a00581049d07f6d9037f18ba01663d0d2c64a51431ebe4c2566f349ba4b0f242342f1014d548ab027fb73191a67456c6fbd922e3
Static task
static1
Behavioral task
behavioral1
Sample
c.ps1
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
c.ps1
Resource
win10v2004-20230703-en
Malware Config
Extracted
metasploit
metasploit_stager
45.153.241.2:999
Targets
-
-
Target
c.ps1
-
Size
949B
-
MD5
3ddd346e351a6f8403679df34db1f5a2
-
SHA1
500e8abf1f075d06ef5a60648b9c866bfa816798
-
SHA256
79a1d293787ec7364bd0749ee4bf817cadd49255ed82075b091d84cc6e005e1b
-
SHA512
6e0d790ba5d55e9f43defd85a00581049d07f6d9037f18ba01663d0d2c64a51431ebe4c2566f349ba4b0f242342f1014d548ab027fb73191a67456c6fbd922e3
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-