General
-
Target
4f94ff7c69fcfdc3fa732ef0cf3b541542a6d14eed0966c8c36d59ebe13dc85aN
-
Size
72KB
-
Sample
240920-q45w2szbla
-
MD5
27341417b941924bb8ff6578097a4960
-
SHA1
17ff8b228a3c2c34cbc01e49e37c68da4022915e
-
SHA256
4f94ff7c69fcfdc3fa732ef0cf3b541542a6d14eed0966c8c36d59ebe13dc85a
-
SHA512
91f42c36c6cb0a5292376044bfd07049e19eccff938dcc5a51b513801b984f7f3ec32efbb9d12048125d314e6aa8847e390fd206dbd683b08f59f64f1b90eec8
-
SSDEEP
1536:IqrTnDchXNXBfIy3VtAjwqNRtFRLmTQMb+KR0Nc8QsJq39:XrTDQ9j3VOwqlFRLmEe0Nc8QsC9
Behavioral task
behavioral1
Sample
4f94ff7c69fcfdc3fa732ef0cf3b541542a6d14eed0966c8c36d59ebe13dc85aN.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4f94ff7c69fcfdc3fa732ef0cf3b541542a6d14eed0966c8c36d59ebe13dc85aN.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/exec
Targets
-
-
Target
4f94ff7c69fcfdc3fa732ef0cf3b541542a6d14eed0966c8c36d59ebe13dc85aN
-
Size
72KB
-
MD5
27341417b941924bb8ff6578097a4960
-
SHA1
17ff8b228a3c2c34cbc01e49e37c68da4022915e
-
SHA256
4f94ff7c69fcfdc3fa732ef0cf3b541542a6d14eed0966c8c36d59ebe13dc85a
-
SHA512
91f42c36c6cb0a5292376044bfd07049e19eccff938dcc5a51b513801b984f7f3ec32efbb9d12048125d314e6aa8847e390fd206dbd683b08f59f64f1b90eec8
-
SSDEEP
1536:IqrTnDchXNXBfIy3VtAjwqNRtFRLmTQMb+KR0Nc8QsJq39:XrTDQ9j3VOwqlFRLmEe0Nc8QsC9
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-