General
-
Target
b78cb2b1d378bb08d7e7bed17c166c30de3af4566835ea54b61ed9422a37ec79
-
Size
72KB
-
Sample
240619-cbqprswdrq
-
MD5
f05958c4ba0ad7770b36c095fd43d104
-
SHA1
9834cba6c66863138ac7f915b6fdd7d513e81772
-
SHA256
b78cb2b1d378bb08d7e7bed17c166c30de3af4566835ea54b61ed9422a37ec79
-
SHA512
d88d368dab5975906e307e9ae427ae8cd0e624cf08fe0e8f21491a48982e8bda5dec028dbb763e05895099aad95d0885d1cf917c1b9fd794c7265ff5d97f8a75
-
SSDEEP
1536:IDyuHNizM3UW8YVwsKueCAisMb+KR0Nc8QsJq39:gyutizM3UW8wwsKprise0Nc8QsC9
Behavioral task
behavioral1
Sample
b78cb2b1d378bb08d7e7bed17c166c30de3af4566835ea54b61ed9422a37ec79.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b78cb2b1d378bb08d7e7bed17c166c30de3af4566835ea54b61ed9422a37ec79.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/shell_bind_tcp
Targets
-
-
Target
b78cb2b1d378bb08d7e7bed17c166c30de3af4566835ea54b61ed9422a37ec79
-
Size
72KB
-
MD5
f05958c4ba0ad7770b36c095fd43d104
-
SHA1
9834cba6c66863138ac7f915b6fdd7d513e81772
-
SHA256
b78cb2b1d378bb08d7e7bed17c166c30de3af4566835ea54b61ed9422a37ec79
-
SHA512
d88d368dab5975906e307e9ae427ae8cd0e624cf08fe0e8f21491a48982e8bda5dec028dbb763e05895099aad95d0885d1cf917c1b9fd794c7265ff5d97f8a75
-
SSDEEP
1536:IDyuHNizM3UW8YVwsKueCAisMb+KR0Nc8QsJq39:gyutizM3UW8wwsKprise0Nc8QsC9
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-