General
-
Target
a1.exe
-
Size
17KB
-
Sample
230808-ntyzmsdh2t
-
MD5
edc57dd59e395db70a30127c3239abe6
-
SHA1
956aaaac134ee10677b37ed4090effe1c59a8e6d
-
SHA256
7ab8ed3cc3032beca624b12e0252b389bd1682def34212b24df5020446960d19
-
SHA512
74b781499f3652f0b7e2f8816b3ea7416f3ef0d4637aa77bc5d995a4da2c56a102aa180c9463e102483b58ba2017f8df0d465210b6bd5df79dbd7c697f988f50
-
SSDEEP
384:CEEoLO56ayzcMj+z+XYRpyTc+2M+0yKgwo0YgtwYYwmcoFPptHDA3:VE8O56lcVz+XVYgtwYIcQTHDA3
Static task
static1
Behavioral task
behavioral1
Sample
a1.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
a1.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
173.212.219.45:5656
Targets
-
-
Target
a1.exe
-
Size
17KB
-
MD5
edc57dd59e395db70a30127c3239abe6
-
SHA1
956aaaac134ee10677b37ed4090effe1c59a8e6d
-
SHA256
7ab8ed3cc3032beca624b12e0252b389bd1682def34212b24df5020446960d19
-
SHA512
74b781499f3652f0b7e2f8816b3ea7416f3ef0d4637aa77bc5d995a4da2c56a102aa180c9463e102483b58ba2017f8df0d465210b6bd5df79dbd7c697f988f50
-
SSDEEP
384:CEEoLO56ayzcMj+z+XYRpyTc+2M+0yKgwo0YgtwYYwmcoFPptHDA3:VE8O56lcVz+XVYgtwYIcQTHDA3
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Blocklisted process makes network request
-