General
-
Target
2024-05-27_a3fdda6699341de4b5d9baa69d4128f9_avoslocker_magniber
-
Size
11.8MB
-
Sample
240527-hcmmdsbb8w
-
MD5
a3fdda6699341de4b5d9baa69d4128f9
-
SHA1
be119f2349951146c8ee697cb556a2fd373a2772
-
SHA256
bf341af967eb41cec554c11507086e20a0313190c2543f73917f2ffbe38724a1
-
SHA512
e8410c8e03711445ffc23b79a96f3f379d94b7507a1d42280a703282b61599489d71a0655ccfb6f8f131e5f0c57b5ee84e5cd2b70597060a2dd8c2ca08c2fd0f
-
SSDEEP
196608:t19Ki8a/Qa4vHdlounj1SHNURgXjZFuGhNIMPSvoTk91HJd2OhZ9se8pF8w/wobr:t3Ki5IDvHd+ujFOXjbNIMYCI1WOhY/wc
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-27_a3fdda6699341de4b5d9baa69d4128f9_avoslocker_magniber.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-27_a3fdda6699341de4b5d9baa69d4128f9_avoslocker_magniber.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
192.168.56.110:4444
Targets
-
-
Target
2024-05-27_a3fdda6699341de4b5d9baa69d4128f9_avoslocker_magniber
-
Size
11.8MB
-
MD5
a3fdda6699341de4b5d9baa69d4128f9
-
SHA1
be119f2349951146c8ee697cb556a2fd373a2772
-
SHA256
bf341af967eb41cec554c11507086e20a0313190c2543f73917f2ffbe38724a1
-
SHA512
e8410c8e03711445ffc23b79a96f3f379d94b7507a1d42280a703282b61599489d71a0655ccfb6f8f131e5f0c57b5ee84e5cd2b70597060a2dd8c2ca08c2fd0f
-
SSDEEP
196608:t19Ki8a/Qa4vHdlounj1SHNURgXjZFuGhNIMPSvoTk91HJd2OhZ9se8pF8w/wobr:t3Ki5IDvHd+ujFOXjbNIMYCI1WOhY/wc
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-