General
-
Target
ed4dad293318b49b17cc38a38bb6148e.exe
-
Size
48KB
-
Sample
240109-xl7fgsgfak
-
MD5
ed4dad293318b49b17cc38a38bb6148e
-
SHA1
bf63ac2a43b4cf2cd6abc4e1f264141861e18239
-
SHA256
92b01fa99e634a32d65d86d5c7753cf15737b76cb6af09d6ef1cd841ab73c4aa
-
SHA512
1fdfac09b4bf5dc902e06920e08973ab97ce98fc8f5ae98f7a7f2f3f6fc79c423c77bdfb0a251855cbfe76a13facf999d12d0266495da43e681f777551223e44
-
SSDEEP
384:RoyWYkyOiuRqskMJyYbUUCSz0QtngVQh+Ynys6KbF9thjN5XojgeDT1nN7ShtNc0:vGRqsk/utnHhtnys3zthN50xnlYPV3
Behavioral task
behavioral1
Sample
ed4dad293318b49b17cc38a38bb6148e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ed4dad293318b49b17cc38a38bb6148e.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
192.168.1.14:4444
Targets
-
-
Target
ed4dad293318b49b17cc38a38bb6148e.exe
-
Size
48KB
-
MD5
ed4dad293318b49b17cc38a38bb6148e
-
SHA1
bf63ac2a43b4cf2cd6abc4e1f264141861e18239
-
SHA256
92b01fa99e634a32d65d86d5c7753cf15737b76cb6af09d6ef1cd841ab73c4aa
-
SHA512
1fdfac09b4bf5dc902e06920e08973ab97ce98fc8f5ae98f7a7f2f3f6fc79c423c77bdfb0a251855cbfe76a13facf999d12d0266495da43e681f777551223e44
-
SSDEEP
384:RoyWYkyOiuRqskMJyYbUUCSz0QtngVQh+Ynys6KbF9thjN5XojgeDT1nN7ShtNc0:vGRqsk/utnHhtnys3zthN50xnlYPV3
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-