General
-
Target
tmp
-
Size
128KB
-
Sample
230819-xst4qsdc91
-
MD5
2b5c5ac56b819bd05ab3151efc814303
-
SHA1
9e4cb9c54e4243998d6c9c1916ac147741c21382
-
SHA256
b71a19618582e3820d4c6f184180eca70e097fbd4b35bae3615e99651d97d9e2
-
SHA512
543129bb5543460735a1b12e7b828532bf95277a24e6be5cb1675c0281bb65913f7c51b6e4bf3f162ea11f044bfd0239c51c74d80747c595b392eaf8023419e5
-
SSDEEP
1536:ju2Jqy4AutHymEUGwFBP3Dp7+MO11U3NsVGlJ:Rqy4AutHLVUBsRlJ
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_http
http://vms.h4ck0ps.cc:8181/lLCGJlVNxPkoOSk4TOsBzgZtRiWWm
Targets
-
-
Target
tmp
-
Size
128KB
-
MD5
2b5c5ac56b819bd05ab3151efc814303
-
SHA1
9e4cb9c54e4243998d6c9c1916ac147741c21382
-
SHA256
b71a19618582e3820d4c6f184180eca70e097fbd4b35bae3615e99651d97d9e2
-
SHA512
543129bb5543460735a1b12e7b828532bf95277a24e6be5cb1675c0281bb65913f7c51b6e4bf3f162ea11f044bfd0239c51c74d80747c595b392eaf8023419e5
-
SSDEEP
1536:ju2Jqy4AutHymEUGwFBP3Dp7+MO11U3NsVGlJ:Rqy4AutHLVUBsRlJ
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Blocklisted process makes network request
-