General
-
Target
9230440aec3a46b96805fee5641b42516dba51465c5306638d1d0924c07b6a55
-
Size
203KB
-
Sample
240916-3kab9avhpb
-
MD5
e28b8f9d02d44890d09099f68b329914
-
SHA1
be447005c84a84cec99e9ba236e056d9277244d7
-
SHA256
9230440aec3a46b96805fee5641b42516dba51465c5306638d1d0924c07b6a55
-
SHA512
9c434a694920deb240ff0f3707a5705ff5c7d09aedf0a15cb9eefc51a6265dd41477011a44ce1621676b71af52d79d7378137c90476b7ca7cc375d439fc2333c
-
SSDEEP
3072:4PvBxdw7brTsht8nK2ZzaHWdTC1EFWmGwJlHk2S8McSGfJIzlgDz9EbbwWNIZKbf:l7bioK2ouTC6FewJlV7YHZIz9EwKS
Behavioral task
behavioral1
Sample
9230440aec3a46b96805fee5641b42516dba51465c5306638d1d0924c07b6a55.exe
Resource
win7-20240903-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
9230440aec3a46b96805fee5641b42516dba51465c5306638d1d0924c07b6a55
-
Size
203KB
-
MD5
e28b8f9d02d44890d09099f68b329914
-
SHA1
be447005c84a84cec99e9ba236e056d9277244d7
-
SHA256
9230440aec3a46b96805fee5641b42516dba51465c5306638d1d0924c07b6a55
-
SHA512
9c434a694920deb240ff0f3707a5705ff5c7d09aedf0a15cb9eefc51a6265dd41477011a44ce1621676b71af52d79d7378137c90476b7ca7cc375d439fc2333c
-
SSDEEP
3072:4PvBxdw7brTsht8nK2ZzaHWdTC1EFWmGwJlHk2S8McSGfJIzlgDz9EbbwWNIZKbf:l7bioK2ouTC6FewJlV7YHZIz9EwKS
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-