General
-
Target
bbcd452a40751882c23ac62aa322e378f59d6e15a2041400cf5d2e7af2ded1fe
-
Size
23KB
-
Sample
240801-1dd1ra1dqf
-
MD5
5b2b236d6e89deeac430258664d8d695
-
SHA1
7ba790eeee21a008722982dc1fca01ff3e7e3bb6
-
SHA256
bbcd452a40751882c23ac62aa322e378f59d6e15a2041400cf5d2e7af2ded1fe
-
SHA512
659f175c80b454c5606bc469b4f6cfedc01ddb99a1cbddfd6621f0d6660a0d1e1f54e20e765c51e921f1d182bbe7396650c93c38c3b95790021d40a5961111e4
-
SSDEEP
384:/irhzg9+8J8EchisLu0e0+GW6teSVO/v0uM2iOiWMSXZcu/CEm+3XG9RjrH9NEvq:/bE8nGK0nzWAo0jOi98Ka8jb9NEv/Qh
Behavioral task
behavioral1
Sample
bbcd452a40751882c23ac62aa322e378f59d6e15a2041400cf5d2e7af2ded1fe.docm
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bbcd452a40751882c23ac62aa322e378f59d6e15a2041400cf5d2e7af2ded1fe.docm
Resource
win10v2004-20240730-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
10.10.10.10:433
Targets
-
-
Target
bbcd452a40751882c23ac62aa322e378f59d6e15a2041400cf5d2e7af2ded1fe
-
Size
23KB
-
MD5
5b2b236d6e89deeac430258664d8d695
-
SHA1
7ba790eeee21a008722982dc1fca01ff3e7e3bb6
-
SHA256
bbcd452a40751882c23ac62aa322e378f59d6e15a2041400cf5d2e7af2ded1fe
-
SHA512
659f175c80b454c5606bc469b4f6cfedc01ddb99a1cbddfd6621f0d6660a0d1e1f54e20e765c51e921f1d182bbe7396650c93c38c3b95790021d40a5961111e4
-
SSDEEP
384:/irhzg9+8J8EchisLu0e0+GW6teSVO/v0uM2iOiWMSXZcu/CEm+3XG9RjrH9NEvq:/bE8nGK0nzWAo0jOi98Ka8jb9NEv/Qh
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE
-
Loads dropped DLL
-