General
-
Target
https://adb275557dfea16195aa39a6fb174c5a.serveo.net/whiledoor.bat
-
Sample
240508-znbgyahd89
Score
10/10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://adb275557dfea16195aa39a6fb174c5a.serveo.net/whiledoor.bat
Resource
win11-20240508-en
windows11-21h2-x64
10 signatures
1200 seconds
Malware Config
Extracted
Family
metasploit
Version
encoder/shikata_ga_nai
Extracted
Family
metasploit
Version
windows/reverse_tcp
C2
147.185.221.19:47344
Targets
-
-
Target
https://adb275557dfea16195aa39a6fb174c5a.serveo.net/whiledoor.bat
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Blocklisted process makes network request
-