General
-
Target
5f6e8ca2260ff07f7cf471d5745d4704
-
Size
234KB
-
Sample
231226-j9j37saah6
-
MD5
5f6e8ca2260ff07f7cf471d5745d4704
-
SHA1
b3c05b6522e69105b80bf5e805a8548d7b79ba40
-
SHA256
a3e1ffc785c4fea323bd3dcd224583c2e45211d856db2f0ef62c53f7335057f2
-
SHA512
05024049689967a80ba9c6393a73ca53248b21b8d08ee08b248c3dcd8b47ac6ba5e26730dc990517ba461995ad3ce88d9e695f9d777c24a75031b26aabc1f9bd
-
SSDEEP
3072:KM/k4DYzdELUW8M7aLT2Qn6AAN/UmCasnjZL:KM/Szd+UW773Qn1AN/YaMR
Behavioral task
behavioral1
Sample
5f6e8ca2260ff07f7cf471d5745d4704.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5f6e8ca2260ff07f7cf471d5745d4704.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
metasploit
windows/reverse_tcp
192.168.0.28:4444
Targets
-
-
Target
5f6e8ca2260ff07f7cf471d5745d4704
-
Size
234KB
-
MD5
5f6e8ca2260ff07f7cf471d5745d4704
-
SHA1
b3c05b6522e69105b80bf5e805a8548d7b79ba40
-
SHA256
a3e1ffc785c4fea323bd3dcd224583c2e45211d856db2f0ef62c53f7335057f2
-
SHA512
05024049689967a80ba9c6393a73ca53248b21b8d08ee08b248c3dcd8b47ac6ba5e26730dc990517ba461995ad3ce88d9e695f9d777c24a75031b26aabc1f9bd
-
SSDEEP
3072:KM/k4DYzdELUW8M7aLT2Qn6AAN/UmCasnjZL:KM/Szd+UW773Qn1AN/YaMR
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-