General
-
Target
reverse_tcp.ps1
-
Size
3KB
-
Sample
240530-e64k8afg34
-
MD5
657aaf2c8944a2ecece034897b805f2b
-
SHA1
904be1d83693515012d6ec0ed21d16e575c822f3
-
SHA256
7db40a37f34545a195973c341554cfb02ae0f105898e20eafb4dfb55f8a65a77
-
SHA512
16c3b2bfa1c8a9b6408be4a916bc28fb33d639f5bf56ed8dd703f16b80fcb014b479d9502cbe74b50183038d0ab8859ca8b2386c6cd628f2a5d9067325ead5f5
Behavioral task
behavioral1
Sample
reverse_tcp.ps1
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
reverse_tcp.ps1
Resource
win10v2004-20240426-en
Malware Config
Extracted
metasploit
metasploit_stager
1.14.247.162:40001
Targets
-
-
Target
reverse_tcp.ps1
-
Size
3KB
-
MD5
657aaf2c8944a2ecece034897b805f2b
-
SHA1
904be1d83693515012d6ec0ed21d16e575c822f3
-
SHA256
7db40a37f34545a195973c341554cfb02ae0f105898e20eafb4dfb55f8a65a77
-
SHA512
16c3b2bfa1c8a9b6408be4a916bc28fb33d639f5bf56ed8dd703f16b80fcb014b479d9502cbe74b50183038d0ab8859ca8b2386c6cd628f2a5d9067325ead5f5
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Blocklisted process makes network request
-