General
-
Target
dd96ca8f78a4950938312d48db25dd437e6fcf219497b987e6616f6c1f9ef92d
-
Size
1.3MB
-
Sample
240417-mavmfabg88
-
MD5
0350162adeb517a08c6ccf00ee33c9ec
-
SHA1
967157d9da8e9e9c89316cd400dcf2f8ad39e3c5
-
SHA256
dd96ca8f78a4950938312d48db25dd437e6fcf219497b987e6616f6c1f9ef92d
-
SHA512
1a1da1148a0b868a7209ee190e7c51bf35bbe9a49ce24a640ddaa9c71150334a8c9450532af653197330c5f4eaa22b8790fd0f834415e10257ab97ffbdf22f51
-
SSDEEP
24576:vocO0VV2cVkyEq9DRho1jFP8ltPP01Ws7+wFPEl9ix4fpUzoQDt+egElxdqFWVCn:jb2cCyEq9DRho/ctH01Ws74rA4RUBDHo
Behavioral task
behavioral1
Sample
dd96ca8f78a4950938312d48db25dd437e6fcf219497b987e6616f6c1f9ef92d.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
dd96ca8f78a4950938312d48db25dd437e6fcf219497b987e6616f6c1f9ef92d.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
192.168.104.130:4321
Targets
-
-
Target
dd96ca8f78a4950938312d48db25dd437e6fcf219497b987e6616f6c1f9ef92d
-
Size
1.3MB
-
MD5
0350162adeb517a08c6ccf00ee33c9ec
-
SHA1
967157d9da8e9e9c89316cd400dcf2f8ad39e3c5
-
SHA256
dd96ca8f78a4950938312d48db25dd437e6fcf219497b987e6616f6c1f9ef92d
-
SHA512
1a1da1148a0b868a7209ee190e7c51bf35bbe9a49ce24a640ddaa9c71150334a8c9450532af653197330c5f4eaa22b8790fd0f834415e10257ab97ffbdf22f51
-
SSDEEP
24576:vocO0VV2cVkyEq9DRho1jFP8ltPP01Ws7+wFPEl9ix4fpUzoQDt+egElxdqFWVCn:jb2cCyEq9DRho/ctH01Ws74rA4RUBDHo
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-