General
-
Target
6b3088d32c8bffbce7e63247a47da587ca4de1e2fc87d62862672eb2640573fe
-
Size
4KB
-
Sample
240620-24849awdln
-
MD5
39c2a40ccb8de007942b403654a5f27a
-
SHA1
39b960000f703d1ddf44961dd0db2917a3c74b0f
-
SHA256
6b3088d32c8bffbce7e63247a47da587ca4de1e2fc87d62862672eb2640573fe
-
SHA512
cd72029d983c8d2b29fb32b4d49874fafcec255ba988976632004b14b2a1aabf4203a60052f8c1324003341006ceb34e323b19febfa82e863368efc4a305da9c
-
SSDEEP
48:6yiMdsWAG4887qbvOZ6ELsrQ15Qm9eX5F4IKFhhUp2xv0ucmABs:fTsWAG4887qbeLs015i5F4dFw2mX16
Behavioral task
behavioral1
Sample
6b3088d32c8bffbce7e63247a47da587ca4de1e2fc87d62862672eb2640573fe.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
6b3088d32c8bffbce7e63247a47da587ca4de1e2fc87d62862672eb2640573fe.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
127.0.0.1:4444
Targets
-
-
Target
6b3088d32c8bffbce7e63247a47da587ca4de1e2fc87d62862672eb2640573fe
-
Size
4KB
-
MD5
39c2a40ccb8de007942b403654a5f27a
-
SHA1
39b960000f703d1ddf44961dd0db2917a3c74b0f
-
SHA256
6b3088d32c8bffbce7e63247a47da587ca4de1e2fc87d62862672eb2640573fe
-
SHA512
cd72029d983c8d2b29fb32b4d49874fafcec255ba988976632004b14b2a1aabf4203a60052f8c1324003341006ceb34e323b19febfa82e863368efc4a305da9c
-
SSDEEP
48:6yiMdsWAG4887qbvOZ6ELsrQ15Qm9eX5F4IKFhhUp2xv0ucmABs:fTsWAG4887qbeLs015i5F4dFw2mX16
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-