General
-
Target
65158a271917b2dbed5ce52df7073288d9ae3305cc0922ff431cee4ffdf6dcfb
-
Size
1.8MB
-
Sample
240916-zsrdyszbjh
-
MD5
660d86b160eb7bf421b5782906adcccb
-
SHA1
8d54bb1a5bda036a4fc4af5cdf07219728c62e95
-
SHA256
65158a271917b2dbed5ce52df7073288d9ae3305cc0922ff431cee4ffdf6dcfb
-
SHA512
f098f81847aa528e6839c17c9f6e01e657c7b321b7da19ef453286bc2eee6ed5490dad58eedb3704d548977dc47600ceeb8e8ee64694f2dded40523d1d457eb4
-
SSDEEP
24576:/3vLRdVhZBK8NogWYO09LOGi9JoBqgvppOir7kw8atSw6ZwaIi0HjwC/hR:/3d5ZQ1NxJ/QUiUUt96Z0D
Static task
static1
Behavioral task
behavioral1
Sample
65158a271917b2dbed5ce52df7073288d9ae3305cc0922ff431cee4ffdf6dcfb.exe
Resource
win7-20240903-en
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
1.15.12.73:4567
Targets
-
-
Target
65158a271917b2dbed5ce52df7073288d9ae3305cc0922ff431cee4ffdf6dcfb
-
Size
1.8MB
-
MD5
660d86b160eb7bf421b5782906adcccb
-
SHA1
8d54bb1a5bda036a4fc4af5cdf07219728c62e95
-
SHA256
65158a271917b2dbed5ce52df7073288d9ae3305cc0922ff431cee4ffdf6dcfb
-
SHA512
f098f81847aa528e6839c17c9f6e01e657c7b321b7da19ef453286bc2eee6ed5490dad58eedb3704d548977dc47600ceeb8e8ee64694f2dded40523d1d457eb4
-
SSDEEP
24576:/3vLRdVhZBK8NogWYO09LOGi9JoBqgvppOir7kw8atSw6ZwaIi0HjwC/hR:/3d5ZQ1NxJ/QUiUUt96Z0D
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-