General
-
Target
2986702ae852119b722794375eca6a6937470ce96f9363fbca8eb7f19700c19e
-
Size
217KB
-
Sample
240305-xjvznsfc66
-
MD5
80581beaf2ac3a69c21a50e6f15c3b19
-
SHA1
58eb556be39086cdb84428bf69466079d7a31cae
-
SHA256
2986702ae852119b722794375eca6a6937470ce96f9363fbca8eb7f19700c19e
-
SHA512
fb38756af311d50b3af1cbf02269ed01b7843622f9e872443155b5bb68017bdbc56166f4c89557b5d5023e70112e25ecdeada3ce3503c31f30cdc1d637b0799b
-
SSDEEP
3072:IUxKmyBNRN4kEVaXjtkprCiJOHohACfOX1uAj4z+iguOdcYIwkIzhuPeEnDj1PIi:lKbBNRXG4UCiJOWO4lBOdcYI5KcnDj6
Static task
static1
Behavioral task
behavioral1
Sample
2986702ae852119b722794375eca6a6937470ce96f9363fbca8eb7f19700c19e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2986702ae852119b722794375eca6a6937470ce96f9363fbca8eb7f19700c19e.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/shell_reverse_tcp
192.168.1.42:443
Targets
-
-
Target
2986702ae852119b722794375eca6a6937470ce96f9363fbca8eb7f19700c19e
-
Size
217KB
-
MD5
80581beaf2ac3a69c21a50e6f15c3b19
-
SHA1
58eb556be39086cdb84428bf69466079d7a31cae
-
SHA256
2986702ae852119b722794375eca6a6937470ce96f9363fbca8eb7f19700c19e
-
SHA512
fb38756af311d50b3af1cbf02269ed01b7843622f9e872443155b5bb68017bdbc56166f4c89557b5d5023e70112e25ecdeada3ce3503c31f30cdc1d637b0799b
-
SSDEEP
3072:IUxKmyBNRN4kEVaXjtkprCiJOHohACfOX1uAj4z+iguOdcYIwkIzhuPeEnDj1PIi:lKbBNRXG4UCiJOWO4lBOdcYI5KcnDj6
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
UPX dump on OEP (original entry point)
-