General
-
Target
82989ca18031638c484db4469a094bcf812641717e0f70480394b17ade9ded98.hta
-
Size
7KB
-
Sample
240531-j89x8scc31
-
MD5
248aa4289e3739f172987f89212e4093
-
SHA1
1d8a58fd8e77c42c0d9f0f9d3a4d118f22c23ac5
-
SHA256
82989ca18031638c484db4469a094bcf812641717e0f70480394b17ade9ded98
-
SHA512
4e24b70280d8e56abcdc03100a28224dde1a3b07a1538dac01f5983e0ff8eb0ef5025c7d87c280255b2dc8918d0a4e0e3e98115efa9152dd11dfcffd57ed15d9
-
SSDEEP
192:+zPn2jh1hqT2Fr2rG71OrYf4KqLl9QhufdUk4TRQW+ZiPj2vF6hd9d:+zPn2jh1hsWr2S7Ar2qLwu1Ukny2Uhdj
Static task
static1
Behavioral task
behavioral1
Sample
82989ca18031638c484db4469a094bcf812641717e0f70480394b17ade9ded98.hta
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
82989ca18031638c484db4469a094bcf812641717e0f70480394b17ade9ded98.hta
Resource
win10v2004-20240508-en
Malware Config
Extracted
metasploit
windows/shell_bind_tcp
Targets
-
-
Target
82989ca18031638c484db4469a094bcf812641717e0f70480394b17ade9ded98.hta
-
Size
7KB
-
MD5
248aa4289e3739f172987f89212e4093
-
SHA1
1d8a58fd8e77c42c0d9f0f9d3a4d118f22c23ac5
-
SHA256
82989ca18031638c484db4469a094bcf812641717e0f70480394b17ade9ded98
-
SHA512
4e24b70280d8e56abcdc03100a28224dde1a3b07a1538dac01f5983e0ff8eb0ef5025c7d87c280255b2dc8918d0a4e0e3e98115efa9152dd11dfcffd57ed15d9
-
SSDEEP
192:+zPn2jh1hqT2Fr2rG71OrYf4KqLl9QhufdUk4TRQW+ZiPj2vF6hd9d:+zPn2jh1hsWr2S7Ar2qLwu1Ukny2Uhdj
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-