General
-
Target
f771efee7b5ea61757ce49e53fb7e0ba4623b45df099a472b48dc3e1a0a9d6cb
-
Size
1.8MB
-
Sample
240523-1jkqgshg4s
-
MD5
a6277a4dd6da17e31eebb8c702e86d6b
-
SHA1
c93a52e6ca0b877871049174569dd5568d93d341
-
SHA256
f771efee7b5ea61757ce49e53fb7e0ba4623b45df099a472b48dc3e1a0a9d6cb
-
SHA512
fc07116a531be4b8d6599c90301fd2c16768c518a23b9d6d27a9c2335f66811253811daa831032f81bcddef18c384341d538d411bb92a9834de484eff02348a2
-
SSDEEP
24576:/3vLRdVhZBK8NogWYO09ZOGi9JbBodjwC/hR:/3d5ZQ1rxJ+
Static task
static1
Behavioral task
behavioral1
Sample
f771efee7b5ea61757ce49e53fb7e0ba4623b45df099a472b48dc3e1a0a9d6cb.exe
Resource
win7-20240508-en
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
1.15.12.73:4567
Targets
-
-
Target
f771efee7b5ea61757ce49e53fb7e0ba4623b45df099a472b48dc3e1a0a9d6cb
-
Size
1.8MB
-
MD5
a6277a4dd6da17e31eebb8c702e86d6b
-
SHA1
c93a52e6ca0b877871049174569dd5568d93d341
-
SHA256
f771efee7b5ea61757ce49e53fb7e0ba4623b45df099a472b48dc3e1a0a9d6cb
-
SHA512
fc07116a531be4b8d6599c90301fd2c16768c518a23b9d6d27a9c2335f66811253811daa831032f81bcddef18c384341d538d411bb92a9834de484eff02348a2
-
SSDEEP
24576:/3vLRdVhZBK8NogWYO09ZOGi9JbBodjwC/hR:/3d5ZQ1rxJ+
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-