General
-
Target
11f7127432d62bdabc6b16c3c7b798b45876eb0f661e8ecfe8a203c0619b2bb4N
-
Size
1.2MB
-
Sample
240918-rdwfcsvcmc
-
MD5
e1fd6f4a9ca1b26d194ca673f10bba10
-
SHA1
6cdb51120068a809d2c2b7746100e5d3b6abd265
-
SHA256
11f7127432d62bdabc6b16c3c7b798b45876eb0f661e8ecfe8a203c0619b2bb4
-
SHA512
61b4f4aedf0ff0afffc84323d6c7b769eb227fefa052145f78dde6f31d893c7c77fddb289bffe4b3cd1968945a37639a2a1f77ea769d5597a87ddeff646bb14c
-
SSDEEP
12288:VDeq6XQ2xIjrwg8d+G6e2S5Est12EUEYO27NUvLFyImxAuT:Vn5rwgxG6TSPGEU7VqvLFyIna
Static task
static1
Behavioral task
behavioral1
Sample
11f7127432d62bdabc6b16c3c7b798b45876eb0f661e8ecfe8a203c0619b2bb4N.exe
Resource
win7-20240903-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
11f7127432d62bdabc6b16c3c7b798b45876eb0f661e8ecfe8a203c0619b2bb4N
-
Size
1.2MB
-
MD5
e1fd6f4a9ca1b26d194ca673f10bba10
-
SHA1
6cdb51120068a809d2c2b7746100e5d3b6abd265
-
SHA256
11f7127432d62bdabc6b16c3c7b798b45876eb0f661e8ecfe8a203c0619b2bb4
-
SHA512
61b4f4aedf0ff0afffc84323d6c7b769eb227fefa052145f78dde6f31d893c7c77fddb289bffe4b3cd1968945a37639a2a1f77ea769d5597a87ddeff646bb14c
-
SSDEEP
12288:VDeq6XQ2xIjrwg8d+G6e2S5Est12EUEYO27NUvLFyImxAuT:Vn5rwgxG6TSPGEU7VqvLFyIna
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-