General
-
Target
2024-05-25_c30c47fa7d1e49930eccc470d9838e28_avoslocker
-
Size
3.2MB
-
Sample
240525-pqtfesbe67
-
MD5
c30c47fa7d1e49930eccc470d9838e28
-
SHA1
14ad3df5ffff9b2bc55a8d67667d8b073e647e48
-
SHA256
1b9c1698a9f6b39d0d1267b457657c2ffc5064d407945702c46691d64e69e03a
-
SHA512
12e7b42b9b22d6bea1ed1d1934dee5127e52abedd4235366751af955bd7c10482075cebfc4930c599f98590f580a134a2ecdc75dd97a7d52b98b96668cae9e23
-
SSDEEP
49152:W3+BF5f37D5to87s3Kv3mqI6VeOMjUfkptVxIyijdTNEW8PhehJqe:W3+BFB3X7oMs3Kv3mjUu5SP
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-25_c30c47fa7d1e49930eccc470d9838e28_avoslocker.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-25_c30c47fa7d1e49930eccc470d9838e28_avoslocker.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
metasploit
windows/reverse_tcp
192.168.0.5:443
Targets
-
-
Target
2024-05-25_c30c47fa7d1e49930eccc470d9838e28_avoslocker
-
Size
3.2MB
-
MD5
c30c47fa7d1e49930eccc470d9838e28
-
SHA1
14ad3df5ffff9b2bc55a8d67667d8b073e647e48
-
SHA256
1b9c1698a9f6b39d0d1267b457657c2ffc5064d407945702c46691d64e69e03a
-
SHA512
12e7b42b9b22d6bea1ed1d1934dee5127e52abedd4235366751af955bd7c10482075cebfc4930c599f98590f580a134a2ecdc75dd97a7d52b98b96668cae9e23
-
SSDEEP
49152:W3+BF5f37D5to87s3Kv3mqI6VeOMjUfkptVxIyijdTNEW8PhehJqe:W3+BFB3X7oMs3Kv3mjUu5SP
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-