General
-
Target
bec0717dd8d0189f01275da4a61d3b01a1c58c67a3efa85147e1abe2eed7e37d
-
Size
46KB
-
Sample
240912-bp6sgatdqn
-
MD5
d955e11b707dffe88cd92082f1eef9eb
-
SHA1
11c4fd60c4d51f20b8c9b483788ca6e3ac0ab14e
-
SHA256
bec0717dd8d0189f01275da4a61d3b01a1c58c67a3efa85147e1abe2eed7e37d
-
SHA512
47721b5e5fd5714072f44d7ef5a5dbec86d308c9c393da31240ae4dfed32e7ceaed704cb95b89d64f4438a4f3cb09254207feb1b35c227cd3ee768c7ded0988d
-
SSDEEP
768:NrvyjsX6IGS6P8PIViosv5k/SmPS84BC/yM/aKRm8QtkCpDbrm:53X6Im8I0Rk6WSqm8QtZDXm
Static task
static1
Behavioral task
behavioral1
Sample
bec0717dd8d0189f01275da4a61d3b01a1c58c67a3efa85147e1abe2eed7e37d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bec0717dd8d0189f01275da4a61d3b01a1c58c67a3efa85147e1abe2eed7e37d.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
bec0717dd8d0189f01275da4a61d3b01a1c58c67a3efa85147e1abe2eed7e37d
-
Size
46KB
-
MD5
d955e11b707dffe88cd92082f1eef9eb
-
SHA1
11c4fd60c4d51f20b8c9b483788ca6e3ac0ab14e
-
SHA256
bec0717dd8d0189f01275da4a61d3b01a1c58c67a3efa85147e1abe2eed7e37d
-
SHA512
47721b5e5fd5714072f44d7ef5a5dbec86d308c9c393da31240ae4dfed32e7ceaed704cb95b89d64f4438a4f3cb09254207feb1b35c227cd3ee768c7ded0988d
-
SSDEEP
768:NrvyjsX6IGS6P8PIViosv5k/SmPS84BC/yM/aKRm8QtkCpDbrm:53X6Im8I0Rk6WSqm8QtZDXm
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Adds Run key to start application
-