General
-
Target
5d1255e4b90fd906538bcb23a6d92f41
-
Size
97KB
-
Sample
240115-pgrv8sgee2
-
MD5
5d1255e4b90fd906538bcb23a6d92f41
-
SHA1
93c2fb75a51bb2e73542896f833b0a345d215f5d
-
SHA256
a4ed98bfe0cf1f115b4d25109f5dad36bd104236f4d21d5f2ec34f786af4feef
-
SHA512
3e153f21221b003166024b1a72d0dff05e02643171e00355efe6c6c9c1d3b2a9db611f9f31762a84f9e2a6ecf1060f71b624f4dd89cec8751338a8eb60e3f63c
-
SSDEEP
768:nySQO6QrbSNNUrgYuMrj6btk2TO1v5KyRkXnNgh+yp3Y27ES0EmTu4aVd907ca1s:XcYbSNTYz/W6vH+ypjSaRQBNvuMtQCiV
Behavioral task
behavioral1
Sample
5d1255e4b90fd906538bcb23a6d92f41.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5d1255e4b90fd906538bcb23a6d92f41.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
192.168.100.53:4444
Targets
-
-
Target
5d1255e4b90fd906538bcb23a6d92f41
-
Size
97KB
-
MD5
5d1255e4b90fd906538bcb23a6d92f41
-
SHA1
93c2fb75a51bb2e73542896f833b0a345d215f5d
-
SHA256
a4ed98bfe0cf1f115b4d25109f5dad36bd104236f4d21d5f2ec34f786af4feef
-
SHA512
3e153f21221b003166024b1a72d0dff05e02643171e00355efe6c6c9c1d3b2a9db611f9f31762a84f9e2a6ecf1060f71b624f4dd89cec8751338a8eb60e3f63c
-
SSDEEP
768:nySQO6QrbSNNUrgYuMrj6btk2TO1v5KyRkXnNgh+yp3Y27ES0EmTu4aVd907ca1s:XcYbSNTYz/W6vH+ypjSaRQBNvuMtQCiV
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-