General
-
Target
53283c49ab02d084b463e2fa1f9b13afcff30b295c2b209f449d488a9a022b61
-
Size
1.8MB
-
Sample
240525-fbkejaeg4t
-
MD5
4afc8987eb25fb8ce5d723fca579fa99
-
SHA1
b82f84275cd5f2794cb1162ee8891a84318b28ac
-
SHA256
53283c49ab02d084b463e2fa1f9b13afcff30b295c2b209f449d488a9a022b61
-
SHA512
cf2b5dd531c40afdbc55e534e0a89e6b7db5f52eafd8e10e012a88a3db1ed2a39a5c0cea3fb9176359ec4f83fc4b5fdb4ca47902658ef9efa7aa66c7e96a5300
-
SSDEEP
24576:/3vLRdVhZBK8NogWYO09yOGi93bBodjwC/hR:/3d5ZQ1yx3+
Static task
static1
Behavioral task
behavioral1
Sample
53283c49ab02d084b463e2fa1f9b13afcff30b295c2b209f449d488a9a022b61.exe
Resource
win7-20240508-en
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
1.15.12.73:4567
Targets
-
-
Target
53283c49ab02d084b463e2fa1f9b13afcff30b295c2b209f449d488a9a022b61
-
Size
1.8MB
-
MD5
4afc8987eb25fb8ce5d723fca579fa99
-
SHA1
b82f84275cd5f2794cb1162ee8891a84318b28ac
-
SHA256
53283c49ab02d084b463e2fa1f9b13afcff30b295c2b209f449d488a9a022b61
-
SHA512
cf2b5dd531c40afdbc55e534e0a89e6b7db5f52eafd8e10e012a88a3db1ed2a39a5c0cea3fb9176359ec4f83fc4b5fdb4ca47902658ef9efa7aa66c7e96a5300
-
SSDEEP
24576:/3vLRdVhZBK8NogWYO09yOGi93bBodjwC/hR:/3d5ZQ1yx3+
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-