General
-
Target
c3afe702252b10c98f2f2e812e17e014b862feb49a17f1befe709a2f816dda8a
-
Size
1.8MB
-
Sample
240625-m3k9gawalb
-
MD5
55724dda8af6e6a3bc381231c553cff6
-
SHA1
f50fbf328fd53fccccc5478e926df8c2b029672a
-
SHA256
c3afe702252b10c98f2f2e812e17e014b862feb49a17f1befe709a2f816dda8a
-
SHA512
f449e061b7390be6cbf055ce7922fa8835d1998f90274f37e0a8ff0d9a599c32b85da4f01bd4b2740251a84a4487e31df237ec863109b182bfd2af5c12df5862
-
SSDEEP
24576:/3vLRdVhZBK8NogWYO09HOGi9JbBodjwC/hR:/3d5ZQ1BxJ+
Static task
static1
Behavioral task
behavioral1
Sample
c3afe702252b10c98f2f2e812e17e014b862feb49a17f1befe709a2f816dda8a.exe
Resource
win7-20240220-en
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
1.15.12.73:4567
Targets
-
-
Target
c3afe702252b10c98f2f2e812e17e014b862feb49a17f1befe709a2f816dda8a
-
Size
1.8MB
-
MD5
55724dda8af6e6a3bc381231c553cff6
-
SHA1
f50fbf328fd53fccccc5478e926df8c2b029672a
-
SHA256
c3afe702252b10c98f2f2e812e17e014b862feb49a17f1befe709a2f816dda8a
-
SHA512
f449e061b7390be6cbf055ce7922fa8835d1998f90274f37e0a8ff0d9a599c32b85da4f01bd4b2740251a84a4487e31df237ec863109b182bfd2af5c12df5862
-
SSDEEP
24576:/3vLRdVhZBK8NogWYO09HOGi9JbBodjwC/hR:/3d5ZQ1BxJ+
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-