General
-
Target
6243c979af9a8fb71ba249edf11280e6
-
Size
256KB
-
Sample
240117-k33gmsccaj
-
MD5
6243c979af9a8fb71ba249edf11280e6
-
SHA1
028ded782cafe098330d801bbdcefa9bd33c8a23
-
SHA256
366b5389fad4a20a37b6fac32cea4d158c51558d1a9bcabd8a0089793c652917
-
SHA512
69c60d9002dbad7be241ce4b578038c46a72f1669c85b5325e5d106959950b700ad19d1e237dc8c6368f5b5a71ca85cbb89f283ea43272392cce3a746e16eb15
-
SSDEEP
6144:XJAfXNyqUk99BUXO88E1eG3O56TLs68aqdRcMHG+EmcG9:XJ4xn9rsd+iy6/s68RC+pEdG
Behavioral task
behavioral1
Sample
6243c979af9a8fb71ba249edf11280e6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6243c979af9a8fb71ba249edf11280e6.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
6243c979af9a8fb71ba249edf11280e6
-
Size
256KB
-
MD5
6243c979af9a8fb71ba249edf11280e6
-
SHA1
028ded782cafe098330d801bbdcefa9bd33c8a23
-
SHA256
366b5389fad4a20a37b6fac32cea4d158c51558d1a9bcabd8a0089793c652917
-
SHA512
69c60d9002dbad7be241ce4b578038c46a72f1669c85b5325e5d106959950b700ad19d1e237dc8c6368f5b5a71ca85cbb89f283ea43272392cce3a746e16eb15
-
SSDEEP
6144:XJAfXNyqUk99BUXO88E1eG3O56TLs68aqdRcMHG+EmcG9:XJ4xn9rsd+iy6/s68RC+pEdG
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-