General
-
Target
reverse_tcp_uuid.msi
-
Size
156KB
-
Sample
240309-mr477sfa35
-
MD5
ea86d9f4827f1b24baf14d0a62111c81
-
SHA1
dfbe48a8b76917ff03cf74d0519dda2c1ab76dfb
-
SHA256
1b678899247d6239f5c03b9f017b6808524d3a5e9320e31f78a355017323db48
-
SHA512
ab86da16e79c4d000ec736528f7e58e5973f2ff9654c1bcb0ba9ef7ef1d14ce3134f5d0f31a5803da93a6676c0c3f35dee0559fe66dda60f16e0098e56ca0d10
-
SSDEEP
384:iHpe4ZvJXK7gzFM7WuMOxceoXgZs+5BCq26yy3M5BCqPN:Zmxa7gBMyuvDCUyWMDC
Behavioral task
behavioral1
Sample
reverse_tcp_uuid.msi
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
reverse_tcp_uuid.msi
Resource
win10v2004-20240226-en
Malware Config
Extracted
metasploit
metasploit_stager
1.14.247.162:40001
Targets
-
-
Target
reverse_tcp_uuid.msi
-
Size
156KB
-
MD5
ea86d9f4827f1b24baf14d0a62111c81
-
SHA1
dfbe48a8b76917ff03cf74d0519dda2c1ab76dfb
-
SHA256
1b678899247d6239f5c03b9f017b6808524d3a5e9320e31f78a355017323db48
-
SHA512
ab86da16e79c4d000ec736528f7e58e5973f2ff9654c1bcb0ba9ef7ef1d14ce3134f5d0f31a5803da93a6676c0c3f35dee0559fe66dda60f16e0098e56ca0d10
-
SSDEEP
384:iHpe4ZvJXK7gzFM7WuMOxceoXgZs+5BCq26yy3M5BCqPN:Zmxa7gBMyuvDCUyWMDC
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-