General
-
Target
5a65e4b822a31fdfed2051c11edaaa89
-
Size
525KB
-
Sample
231226-hg74wsheg6
-
MD5
5a65e4b822a31fdfed2051c11edaaa89
-
SHA1
61747ddc2c29f2fea860c8d0829e438ef66a32e9
-
SHA256
39b8223acf5a3a8a7102bb297d750a12654e1192cf7d55a01cf5561efa323b9c
-
SHA512
1ff035836bd0f2143b696bb93def60c4c55d9cdc99a1aafc723b140122ecf001714f0580c54cf749499ea3cc4033ea386193e351ad7a8f77aa4b56557e1ce00d
-
SSDEEP
6144:dwVPqTSTVFhaae3OR3wxJXSMaAA4OUi1DZyRn5ERmnfN/05YacxIBnn8H2QYvM4X:Gxfw3OR3cdAV51ch5ERa/3nxIl4i6A/
Static task
static1
Behavioral task
behavioral1
Sample
5a65e4b822a31fdfed2051c11edaaa89.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5a65e4b822a31fdfed2051c11edaaa89.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
5a65e4b822a31fdfed2051c11edaaa89
-
Size
525KB
-
MD5
5a65e4b822a31fdfed2051c11edaaa89
-
SHA1
61747ddc2c29f2fea860c8d0829e438ef66a32e9
-
SHA256
39b8223acf5a3a8a7102bb297d750a12654e1192cf7d55a01cf5561efa323b9c
-
SHA512
1ff035836bd0f2143b696bb93def60c4c55d9cdc99a1aafc723b140122ecf001714f0580c54cf749499ea3cc4033ea386193e351ad7a8f77aa4b56557e1ce00d
-
SSDEEP
6144:dwVPqTSTVFhaae3OR3wxJXSMaAA4OUi1DZyRn5ERmnfN/05YacxIBnn8H2QYvM4X:Gxfw3OR3cdAV51ch5ERa/3nxIl4i6A/
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-