General
-
Target
070281b8c1a72893182928c21bf7241a0ad8c95879969d5f58e28d08f1a73b55.zip
-
Size
21KB
-
Sample
231122-r4d9rsdb45
-
MD5
5f3033400f6d65ed1a916f5e506dbd03
-
SHA1
a590892b95bb507cd20eed4a5203674cdde531de
-
SHA256
83fc3e3b9457befadb764ef4d65c517ae2dbd4f0c6104196904b3dcf04f5605f
-
SHA512
ac441248a7a48662226917bd240c194ba8201a6fed68ed50ed74ecadcda4bb5cf77fc948e46b509fcb234925bdd8634aa8b3191e40ed1f241342e685579605c3
-
SSDEEP
384:A8gnhBb+aPbpH58vWA5JoLYWdM0BIEpomqJx7blYdUy5u+peL:Un7CaDIWCJoMWdPBII5QFyC2oL
Static task
static1
Behavioral task
behavioral1
Sample
070281b8c1a72893182928c21bf7241a0ad8c95879969d5f58e28d08f1a73b55.dotm
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
070281b8c1a72893182928c21bf7241a0ad8c95879969d5f58e28d08f1a73b55.dotm
Resource
win10v2004-20231020-en
Malware Config
Extracted
metasploit
windows/download_exec
http://47.93.63.179:7498/taO8
- headers User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Targets
-
-
Target
070281b8c1a72893182928c21bf7241a0ad8c95879969d5f58e28d08f1a73b55.doc
-
Size
24KB
-
MD5
528264e5e1dc298e49ead0e429569cc7
-
SHA1
e621a05288ec315e3b0b9566798a028341f497b8
-
SHA256
070281b8c1a72893182928c21bf7241a0ad8c95879969d5f58e28d08f1a73b55
-
SHA512
f6980c6f792f5b5be2cf6bfaec425cefa53f80cb9d1cd75bf7e2c5b338cd17b705c8d5a09d4e486c2ead1b5ae371ab94914c251cfadef15ffde2a7b1a53bf0b4
-
SSDEEP
384:tmt7pThZJrflNF3MZZb2JBfMT9U2uONT+zvevv+42nswKS2UCBzGpFXwB3E:qtTXxf7F3MZZyJ0uiCvI2hKS2UauXwa
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Process spawned suspicious child process
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
-