General
-
Target
cc036123dc65bffbe5c5650d4c02e1eb666127be1703d9a43a86d327c1fe7f3e
-
Size
72KB
-
Sample
240911-cz473axhjk
-
MD5
84bbc18bb186a5ef14a21231fffe089e
-
SHA1
4713ad0023e73735a6f3638a9702aafbff2eaaa7
-
SHA256
cc036123dc65bffbe5c5650d4c02e1eb666127be1703d9a43a86d327c1fe7f3e
-
SHA512
6dd82616f967ca68b83c6dc01cd13619545575bddd09b737df6cdeb78f03d596d2e1e3e83599ce901e1b4e9eeff56da56be688f0dc5002622c768b8b36a9bb0e
-
SSDEEP
1536:I3fkF+aP1ixj4o+VZ+zyWujTUASacKORv2NXMb+KR0Nc8QsJq39:2fkEyixfkZ9caoYNXe0Nc8QsC9
Behavioral task
behavioral1
Sample
cc036123dc65bffbe5c5650d4c02e1eb666127be1703d9a43a86d327c1fe7f3e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cc036123dc65bffbe5c5650d4c02e1eb666127be1703d9a43a86d327c1fe7f3e.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
192.168.100.13:4444
Targets
-
-
Target
cc036123dc65bffbe5c5650d4c02e1eb666127be1703d9a43a86d327c1fe7f3e
-
Size
72KB
-
MD5
84bbc18bb186a5ef14a21231fffe089e
-
SHA1
4713ad0023e73735a6f3638a9702aafbff2eaaa7
-
SHA256
cc036123dc65bffbe5c5650d4c02e1eb666127be1703d9a43a86d327c1fe7f3e
-
SHA512
6dd82616f967ca68b83c6dc01cd13619545575bddd09b737df6cdeb78f03d596d2e1e3e83599ce901e1b4e9eeff56da56be688f0dc5002622c768b8b36a9bb0e
-
SSDEEP
1536:I3fkF+aP1ixj4o+VZ+zyWujTUASacKORv2NXMb+KR0Nc8QsJq39:2fkEyixfkZ9caoYNXe0Nc8QsC9
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-