General
-
Target
Winrar-Crracked.exe
-
Size
3.9MB
-
Sample
240909-fkjjlavfqb
-
MD5
dd76d6ce1e675bf632ec21d0520189eb
-
SHA1
bc9a0f7e0061860146abecdd977df6bf52ec1cab
-
SHA256
123ef10c1c03e2e3c31929cb49c9d70b6dac7d5fbd29de7c25846afe007b2969
-
SHA512
a4636f6bf0eedae51a2f590a34e24c9feb73e7aa5a58636d473653e50abb3cae169d8b2a14bfa7c890ff8587b94d8de5ba68df81b6257d2f85993ebdde009bcf
-
SSDEEP
98304:sNRBOBfKgQIm9EOTqw8vjh9Ac9nUNupK4hVvcF+yHrAMBF:2R/gmeOqv7Ac9F0k
Static task
static1
Behavioral task
behavioral1
Sample
Winrar-Crracked.exe
Resource
win11-20240802-en
Malware Config
Extracted
metasploit
windows/download_exec
http://20.173.74.203:8080/TwX9
- headers User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; QQDownload 733; InfoPath.2)
Targets
-
-
Target
Winrar-Crracked.exe
-
Size
3.9MB
-
MD5
dd76d6ce1e675bf632ec21d0520189eb
-
SHA1
bc9a0f7e0061860146abecdd977df6bf52ec1cab
-
SHA256
123ef10c1c03e2e3c31929cb49c9d70b6dac7d5fbd29de7c25846afe007b2969
-
SHA512
a4636f6bf0eedae51a2f590a34e24c9feb73e7aa5a58636d473653e50abb3cae169d8b2a14bfa7c890ff8587b94d8de5ba68df81b6257d2f85993ebdde009bcf
-
SSDEEP
98304:sNRBOBfKgQIm9EOTqw8vjh9Ac9nUNupK4hVvcF+yHrAMBF:2R/gmeOqv7Ac9F0k
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-