General
-
Target
http://4.233.216.133
-
Sample
230801-z3t8lacc8y
Score
10/10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://4.233.216.133
Resource
win10v2004-20230703-en
windows10-2004-x64
21 signatures
1800 seconds
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
ps1.dropper
http://31.41.244.231/AVAVA/WAW/F0.oo
Extracted
Family
metasploit
Version
windows/download_exec
C2
http://banqueislamik.ddrive.online:4448/x79t
Attributes
- headers User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)
Targets
-
-
Target
http://4.233.216.133
Score10/10-
Luca Stealer payload
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-