General
-
Target
62.exe
-
Size
17KB
-
Sample
230817-v87zesda6s
-
MD5
c057a7606fbf30b436abd1a54c120e5b
-
SHA1
2a265c41281f39bd682e19bf223a83b878f541ee
-
SHA256
a9065daea54083ef8f8496d8120fd5aafb5cd64699f0ea241b2ad96f08fb9e2c
-
SHA512
baaa36cff95808633402c794abc354d8018eb1492b4e71ad0e48e32685cf7d8f756fecc47c8c3bbea41a6b5ef264fb3bb00574d16777fab5df2a6604642fe402
-
SSDEEP
384:9EEoLO56ayzcMj+2+X+Kc9IDqwFCYgaw7hwmc39nfTlyv7yJC/:aE8O56lcV2+XCXYgaw7zctfTlyv7yJC/
Static task
static1
Behavioral task
behavioral1
Sample
62.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
62.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
173.212.219.45:6006
Targets
-
-
Target
62.exe
-
Size
17KB
-
MD5
c057a7606fbf30b436abd1a54c120e5b
-
SHA1
2a265c41281f39bd682e19bf223a83b878f541ee
-
SHA256
a9065daea54083ef8f8496d8120fd5aafb5cd64699f0ea241b2ad96f08fb9e2c
-
SHA512
baaa36cff95808633402c794abc354d8018eb1492b4e71ad0e48e32685cf7d8f756fecc47c8c3bbea41a6b5ef264fb3bb00574d16777fab5df2a6604642fe402
-
SSDEEP
384:9EEoLO56ayzcMj+2+X+Kc9IDqwFCYgaw7hwmc39nfTlyv7yJC/:aE8O56lcV2+XCXYgaw7zctfTlyv7yJC/
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Blocklisted process makes network request
-