General
-
Target
bba91dfb3b43d8d9690bf3f508bb002197a0abb6047d1fe9cafc36c08c49aab4
-
Size
6KB
-
Sample
231011-ywfwysac81
-
MD5
87134d2df66f9865d5e173c0c9aa9f83
-
SHA1
6d7be1b1add2538be3d61cc5b4cde34def26dee8
-
SHA256
bba91dfb3b43d8d9690bf3f508bb002197a0abb6047d1fe9cafc36c08c49aab4
-
SHA512
c415a87f03eb1e0874e0191621d971d263acb56fc4467190d706ca8a8470197b25db99e46e68bc543aa8b6e977a3d8f0c3dedb995a87903d1ecb70a542e1901b
-
SSDEEP
96:Xqhv+tzYWEvxuFHpmAiNIL9kHo2ywfyt//VzNt:KRvxCJTj6o7w2v
Behavioral task
behavioral1
Sample
bba91dfb3b43d8d9690bf3f508bb002197a0abb6047d1fe9cafc36c08c49aab4.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
bba91dfb3b43d8d9690bf3f508bb002197a0abb6047d1fe9cafc36c08c49aab4.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
192.168.40.129:3344
Targets
-
-
Target
bba91dfb3b43d8d9690bf3f508bb002197a0abb6047d1fe9cafc36c08c49aab4
-
Size
6KB
-
MD5
87134d2df66f9865d5e173c0c9aa9f83
-
SHA1
6d7be1b1add2538be3d61cc5b4cde34def26dee8
-
SHA256
bba91dfb3b43d8d9690bf3f508bb002197a0abb6047d1fe9cafc36c08c49aab4
-
SHA512
c415a87f03eb1e0874e0191621d971d263acb56fc4467190d706ca8a8470197b25db99e46e68bc543aa8b6e977a3d8f0c3dedb995a87903d1ecb70a542e1901b
-
SSDEEP
96:Xqhv+tzYWEvxuFHpmAiNIL9kHo2ywfyt//VzNt:KRvxCJTj6o7w2v
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-