General
-
Target
download.exe
-
Size
4KB
-
Sample
240607-vkg34acd47
-
MD5
512c08286e3d66c21987e05f09ce7125
-
SHA1
5a5970be0883565aeef9ab152713d6a41ac7daf6
-
SHA256
716b65a42612f32fa410f3365eae3e348b9f046d5678e280f8e448d8c6e7b852
-
SHA512
b20db24435d54afdbb4f89a307212622739ea9a63bd2c668214f0493e92d38edde0bf59aece36f89f7152a0039ba06169313a7cca0f671c645d00b8a50012cac
-
SSDEEP
96:pxd6xaXg+9n+O0Kv5jhB5IJuG7XZgD6tYTB9X:LM0dp+BKvhhEuG7peDB1
Behavioral task
behavioral1
Sample
download.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
download.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/exec
Extracted
http://20.81.130.178:8080/ransomware.exe
Targets
-
-
Target
download.exe
-
Size
4KB
-
MD5
512c08286e3d66c21987e05f09ce7125
-
SHA1
5a5970be0883565aeef9ab152713d6a41ac7daf6
-
SHA256
716b65a42612f32fa410f3365eae3e348b9f046d5678e280f8e448d8c6e7b852
-
SHA512
b20db24435d54afdbb4f89a307212622739ea9a63bd2c668214f0493e92d38edde0bf59aece36f89f7152a0039ba06169313a7cca0f671c645d00b8a50012cac
-
SSDEEP
96:pxd6xaXg+9n+O0Kv5jhB5IJuG7XZgD6tYTB9X:LM0dp+BKvhhEuG7peDB1
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-