General
-
Target
6cca05a67555dffeb4069f1b57ef2c3ca9f01b3bba6c8f69c4fd2c26256b0628
-
Size
76KB
-
Sample
240920-jz58paxaqp
-
MD5
6749d033acc7831369838214f516d30e
-
SHA1
62629c3c670e996474f75fdbc4ac67c756ba19a2
-
SHA256
6cca05a67555dffeb4069f1b57ef2c3ca9f01b3bba6c8f69c4fd2c26256b0628
-
SHA512
f5bb4b402758df9bd156c8b94d93abfadd4291105812ac2282ca8af8e99686b6bb398ef3867e2ef2f6ba75977f71b7f891eb398e9a46fb1ca970c29ad8ec2de9
-
SSDEEP
768:Iixw+tHKI43TqiVZHyrJ+pXrRDBjg/wekD/r6:fxrtqkrJ+pXdq/wRO
Behavioral task
behavioral1
Sample
6cca05a67555dffeb4069f1b57ef2c3ca9f01b3bba6c8f69c4fd2c26256b0628.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6cca05a67555dffeb4069f1b57ef2c3ca9f01b3bba6c8f69c4fd2c26256b0628.doc
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
windows/reverse_tcp
10.127.253.25:555
Targets
-
-
Target
6cca05a67555dffeb4069f1b57ef2c3ca9f01b3bba6c8f69c4fd2c26256b0628
-
Size
76KB
-
MD5
6749d033acc7831369838214f516d30e
-
SHA1
62629c3c670e996474f75fdbc4ac67c756ba19a2
-
SHA256
6cca05a67555dffeb4069f1b57ef2c3ca9f01b3bba6c8f69c4fd2c26256b0628
-
SHA512
f5bb4b402758df9bd156c8b94d93abfadd4291105812ac2282ca8af8e99686b6bb398ef3867e2ef2f6ba75977f71b7f891eb398e9a46fb1ca970c29ad8ec2de9
-
SSDEEP
768:Iixw+tHKI43TqiVZHyrJ+pXrRDBjg/wekD/r6:fxrtqkrJ+pXdq/wRO
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-