General
-
Target
2d5e24a64ce7641682b03142a206974d85a0e856d41795ee87975c3640f38172
-
Size
1.8MB
-
Sample
240526-gsk8tshc9z
-
MD5
e76af6c64ad849230a400e5c924deed0
-
SHA1
c5a2334d329385f4d8e7e38fbe6d974d07511786
-
SHA256
2d5e24a64ce7641682b03142a206974d85a0e856d41795ee87975c3640f38172
-
SHA512
805fb98058da7ee4fdbdcafe2ae03805472eacbbdf3663d614d2d767da7ce5c041bed7d0d8e2231b53c24f0afb6a84525f23b8f8fdd4895af607f14f476bd4d8
-
SSDEEP
24576:/3vLRdVhZBK8NogWYO092OGi9JbBodjwC/hR:/3d5ZQ1CxJ+
Static task
static1
Behavioral task
behavioral1
Sample
2d5e24a64ce7641682b03142a206974d85a0e856d41795ee87975c3640f38172.exe
Resource
win7-20240221-en
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
1.15.12.73:4567
Targets
-
-
Target
2d5e24a64ce7641682b03142a206974d85a0e856d41795ee87975c3640f38172
-
Size
1.8MB
-
MD5
e76af6c64ad849230a400e5c924deed0
-
SHA1
c5a2334d329385f4d8e7e38fbe6d974d07511786
-
SHA256
2d5e24a64ce7641682b03142a206974d85a0e856d41795ee87975c3640f38172
-
SHA512
805fb98058da7ee4fdbdcafe2ae03805472eacbbdf3663d614d2d767da7ce5c041bed7d0d8e2231b53c24f0afb6a84525f23b8f8fdd4895af607f14f476bd4d8
-
SSDEEP
24576:/3vLRdVhZBK8NogWYO092OGi9JbBodjwC/hR:/3d5ZQ1CxJ+
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-