General
-
Target
cb5f96fa73006ec910553fb2a3bc986d
-
Size
172KB
-
Sample
240315-pb49daga2z
-
MD5
cb5f96fa73006ec910553fb2a3bc986d
-
SHA1
7fe83fcbc70e9a152610e8b7ad77b4af6e7058a0
-
SHA256
b694691dc58c664b72191f81523cf4ae3926283f3d77d363fd5d14786d069549
-
SHA512
a3a505d1b4a3caf2f86c7465df3816c652cd2906e6ab25e976be3bcf2b385d3015ac3c29d03ba9dd38c81b9dc836e8083b8a230d1a4bc0ed97703f9d89e1865e
-
SSDEEP
3072:V9P0I2tfDXvFdHHbVP3ifOJzlFwV+u9tBb2W6eSMmd:VJ2RXtdHNyf8zlKJtFZ6LMm
Static task
static1
Behavioral task
behavioral1
Sample
cb5f96fa73006ec910553fb2a3bc986d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cb5f96fa73006ec910553fb2a3bc986d.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
cb5f96fa73006ec910553fb2a3bc986d
-
Size
172KB
-
MD5
cb5f96fa73006ec910553fb2a3bc986d
-
SHA1
7fe83fcbc70e9a152610e8b7ad77b4af6e7058a0
-
SHA256
b694691dc58c664b72191f81523cf4ae3926283f3d77d363fd5d14786d069549
-
SHA512
a3a505d1b4a3caf2f86c7465df3816c652cd2906e6ab25e976be3bcf2b385d3015ac3c29d03ba9dd38c81b9dc836e8083b8a230d1a4bc0ed97703f9d89e1865e
-
SSDEEP
3072:V9P0I2tfDXvFdHHbVP3ifOJzlFwV+u9tBb2W6eSMmd:VJ2RXtdHNyf8zlKJtFZ6LMm
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-