General
-
Target
585c4661a9f21f1cdab069ed9f19270d52fc79e0e46d86f4b1268342d23b5cb2
-
Size
42KB
-
Sample
230820-t2m51agf26
-
MD5
b75233002e0cae37f56f6019f801bcbf
-
SHA1
79aacd8c94e996632a7d75f985ed53a184b4c78b
-
SHA256
585c4661a9f21f1cdab069ed9f19270d52fc79e0e46d86f4b1268342d23b5cb2
-
SHA512
ab7fe729843780836874d5dcd823f1d6301469e3cc487be337a92437196ca3655de7b48d4379cfd6a61464e7954446d7a01d25b6a52d6a15b7d384d1e4c4bf4b
-
SSDEEP
768:fv2+z6ZEZbzIa6Jf1O9xQ6eSYntnUlq5o7/NKPMQWtsdBd5qKXaWWa4JMzNxnPVi:fe+z6WbOfQuZSYtnkq5O/0MPoSKRWa4B
Behavioral task
behavioral1
Sample
CARRD.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
CARRD.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
metasploit
windows/exec
Targets
-
-
Target
CARRD.exe
-
Size
72KB
-
MD5
2dc87d7f820efb3eb2f9aa422165a08a
-
SHA1
12fc8afe8bb438493339734b924366765a2974a5
-
SHA256
39b9590ead8f91f8f9abed4434a84bc76133e3510b198863a225149cd69f66c2
-
SHA512
8bb3630dcc8d2629e717327a1db2ce82d3576a09823a738500af624ce9c1a5260d7cb96abb6455a8445facffd9aaf77ac87a590dd16afb027add093fae5580f0
-
SSDEEP
1536:Is46cW9Gy/0Z+Onjs6VE4MquSMb+KR0Nc8QsJq39:J46cW9GyXq52wxe0Nc8QsC9
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Blocklisted process makes network request
-