General
-
Target
302ca9e9b367db114658cfc32a391e2c1cbddb7c60c21d45de6d628d67339e00
-
Size
1.8MB
-
Sample
240603-s4hsmacd34
-
MD5
3e651220b60822c71624cb74c4f746a5
-
SHA1
5c9319481e00de0cec86986c0b0250d20b8841e3
-
SHA256
302ca9e9b367db114658cfc32a391e2c1cbddb7c60c21d45de6d628d67339e00
-
SHA512
3ea877f9fa94efa54a54d3589369d88008be0776517b4af960a38a2a74dcb2e46fdf23f5d4d2f2d9c45067cc86c38cbe0a9c77298fce19da328b211b8cb7e140
-
SSDEEP
24576:/3vLRdVhZBK8NogWYO09HOGi933YiWdCMJ5QxmjwC/hR:/3d5ZQ1Zx3IiW0MbQxA
Static task
static1
Behavioral task
behavioral1
Sample
302ca9e9b367db114658cfc32a391e2c1cbddb7c60c21d45de6d628d67339e00.exe
Resource
win7-20240419-en
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
1.15.12.73:4567
Targets
-
-
Target
302ca9e9b367db114658cfc32a391e2c1cbddb7c60c21d45de6d628d67339e00
-
Size
1.8MB
-
MD5
3e651220b60822c71624cb74c4f746a5
-
SHA1
5c9319481e00de0cec86986c0b0250d20b8841e3
-
SHA256
302ca9e9b367db114658cfc32a391e2c1cbddb7c60c21d45de6d628d67339e00
-
SHA512
3ea877f9fa94efa54a54d3589369d88008be0776517b4af960a38a2a74dcb2e46fdf23f5d4d2f2d9c45067cc86c38cbe0a9c77298fce19da328b211b8cb7e140
-
SSDEEP
24576:/3vLRdVhZBK8NogWYO09HOGi933YiWdCMJ5QxmjwC/hR:/3d5ZQ1Zx3IiW0MbQxA
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-