General
-
Target
c2fcc8f10f8aac0d0f14b91f3c43f795ad93a47a11e06d15d9db5e9f7f1b2401
-
Size
1.3MB
-
Sample
240520-j6ez3sbc54
-
MD5
069e3f823267f523b4e9e78964290e8b
-
SHA1
e90074ccb79610ca71d6e9bf23f9ba63c52be4b3
-
SHA256
c2fcc8f10f8aac0d0f14b91f3c43f795ad93a47a11e06d15d9db5e9f7f1b2401
-
SHA512
96ef1f13f6176b1b7b6547802a7fa89f0bd25aa1990d407cc3ceafa7846859427fc0ae9d4a60ad528bfda093844d204ad0a469ad7caace39f8408e3a14446f33
-
SSDEEP
24576:yDIVZif04z0P24rItaRU4Sn+RfMRoNkXhPitCd0lDNIveX4bcoy0kO:sz0fU4vRfMRoNkRPitR2
Static task
static1
Behavioral task
behavioral1
Sample
c2fcc8f10f8aac0d0f14b91f3c43f795ad93a47a11e06d15d9db5e9f7f1b2401.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c2fcc8f10f8aac0d0f14b91f3c43f795ad93a47a11e06d15d9db5e9f7f1b2401.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
metasploit
windows/reverse_tcp
192.168.1.1:1337
Targets
-
-
Target
c2fcc8f10f8aac0d0f14b91f3c43f795ad93a47a11e06d15d9db5e9f7f1b2401
-
Size
1.3MB
-
MD5
069e3f823267f523b4e9e78964290e8b
-
SHA1
e90074ccb79610ca71d6e9bf23f9ba63c52be4b3
-
SHA256
c2fcc8f10f8aac0d0f14b91f3c43f795ad93a47a11e06d15d9db5e9f7f1b2401
-
SHA512
96ef1f13f6176b1b7b6547802a7fa89f0bd25aa1990d407cc3ceafa7846859427fc0ae9d4a60ad528bfda093844d204ad0a469ad7caace39f8408e3a14446f33
-
SSDEEP
24576:yDIVZif04z0P24rItaRU4Sn+RfMRoNkXhPitCd0lDNIveX4bcoy0kO:sz0fU4vRfMRoNkRPitR2
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-