General
-
Target
89bba64468193b641dbf603634ecc5f59bc6e66fb84a0c4e7260b51689025f7a
-
Size
45KB
-
Sample
240911-3g2bkazald
-
MD5
d7a177fddca9814648ec7506018afbaa
-
SHA1
9da130b0ba11db32c01468cd23ef42d30ecd46c6
-
SHA256
89bba64468193b641dbf603634ecc5f59bc6e66fb84a0c4e7260b51689025f7a
-
SHA512
e2eb364131212186af3d0af39df66bab42f6e11787a26661d3c2297deed2efc27add12240badf70abf849f7174c930a0f9bddaa7c6e9bb0e6a4b8815530836c4
-
SSDEEP
768:RksD/avxKYZ2DiAJIIufWki+qHYHXjvhCbFv8+l0cZtxcuit3:+5Z2NJpiW/+n3md8sfxc
Static task
static1
Behavioral task
behavioral1
Sample
89bba64468193b641dbf603634ecc5f59bc6e66fb84a0c4e7260b51689025f7a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
89bba64468193b641dbf603634ecc5f59bc6e66fb84a0c4e7260b51689025f7a.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
89bba64468193b641dbf603634ecc5f59bc6e66fb84a0c4e7260b51689025f7a
-
Size
45KB
-
MD5
d7a177fddca9814648ec7506018afbaa
-
SHA1
9da130b0ba11db32c01468cd23ef42d30ecd46c6
-
SHA256
89bba64468193b641dbf603634ecc5f59bc6e66fb84a0c4e7260b51689025f7a
-
SHA512
e2eb364131212186af3d0af39df66bab42f6e11787a26661d3c2297deed2efc27add12240badf70abf849f7174c930a0f9bddaa7c6e9bb0e6a4b8815530836c4
-
SSDEEP
768:RksD/avxKYZ2DiAJIIufWki+qHYHXjvhCbFv8+l0cZtxcuit3:+5Z2NJpiW/+n3md8sfxc
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Adds Run key to start application
-