General
-
Target
6e1f87e51a0e7711403f75f2e76eef63
-
Size
45KB
-
Sample
240121-3jbtpaccg5
-
MD5
6e1f87e51a0e7711403f75f2e76eef63
-
SHA1
6577d07aba67beb8697716e2180813f06e23a397
-
SHA256
b8f038fd11b8dec71bc2602f86bacec23c314e52380cc89e0e21a1e772e24c3c
-
SHA512
fd1e66f7cfa4f7e652be1ff99bb08a54274c8670a9a11f9da311db67c56bc210ef1904ba9c39b551d664df238e1b56d78709faaca4834f6ec9822de8d6c2b3ba
-
SSDEEP
768:UNZeUS2mykVi2PN+1nQZtTik3MB7dLQd/+vxs6rZ:4/mPV/PNQQyeMB79yM
Static task
static1
Behavioral task
behavioral1
Sample
6e1f87e51a0e7711403f75f2e76eef63.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6e1f87e51a0e7711403f75f2e76eef63.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
6e1f87e51a0e7711403f75f2e76eef63
-
Size
45KB
-
MD5
6e1f87e51a0e7711403f75f2e76eef63
-
SHA1
6577d07aba67beb8697716e2180813f06e23a397
-
SHA256
b8f038fd11b8dec71bc2602f86bacec23c314e52380cc89e0e21a1e772e24c3c
-
SHA512
fd1e66f7cfa4f7e652be1ff99bb08a54274c8670a9a11f9da311db67c56bc210ef1904ba9c39b551d664df238e1b56d78709faaca4834f6ec9822de8d6c2b3ba
-
SSDEEP
768:UNZeUS2mykVi2PN+1nQZtTik3MB7dLQd/+vxs6rZ:4/mPV/PNQQyeMB79yM
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-