General
-
Target
https://drive.google.com/file/d/1YNsJ_GhMBhGJkw4BzpfOCNbyRV_szpTC/view?usp=sharing
-
Sample
230722-vl959sbe92
Score
10/10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1YNsJ_GhMBhGJkw4BzpfOCNbyRV_szpTC/view?usp=sharing
Resource
win10v2004-20230703-en
13 signatures
1800 seconds
Malware Config
Extracted
Family
metasploit
Version
encoder/shikata_ga_nai
Extracted
Family
metasploit
Version
windows/reverse_tcp
C2
192.168.15.176:80
Targets
-
-
Target
https://drive.google.com/file/d/1YNsJ_GhMBhGJkw4BzpfOCNbyRV_szpTC/view?usp=sharing
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Legitimate hosting services abused for malware hosting/C2
-