General
-
Target
e441db3e3f7cf3519f7aca1d85b1b925655ca011dfe91aa6983a59b97a50314e
-
Size
793KB
-
Sample
240921-zhmm1ssgpk
-
MD5
12c839c0e82ac3e3a2d6ed2ee1f2e698
-
SHA1
03cc269fd70629bac04fb52034c77c76a3c0bede
-
SHA256
e441db3e3f7cf3519f7aca1d85b1b925655ca011dfe91aa6983a59b97a50314e
-
SHA512
3ec422007988adda3c96febce17801d15278cd95a3f85009e4f0741e441b5c1ac630a688a34dd4f73923b548f50bb8a08961ee8415f40628b5965d03de24ee7b
-
SSDEEP
24576:L6ftojDBeSYnItP3CZt6IZx89W0CxV9asvCpm2:LLp9oItfmf8Alm
Behavioral task
behavioral1
Sample
e441db3e3f7cf3519f7aca1d85b1b925655ca011dfe91aa6983a59b97a50314e.exe
Resource
win7-20240708-en
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
1.15.12.73:4567
Targets
-
-
Target
e441db3e3f7cf3519f7aca1d85b1b925655ca011dfe91aa6983a59b97a50314e
-
Size
793KB
-
MD5
12c839c0e82ac3e3a2d6ed2ee1f2e698
-
SHA1
03cc269fd70629bac04fb52034c77c76a3c0bede
-
SHA256
e441db3e3f7cf3519f7aca1d85b1b925655ca011dfe91aa6983a59b97a50314e
-
SHA512
3ec422007988adda3c96febce17801d15278cd95a3f85009e4f0741e441b5c1ac630a688a34dd4f73923b548f50bb8a08961ee8415f40628b5965d03de24ee7b
-
SSDEEP
24576:L6ftojDBeSYnItP3CZt6IZx89W0CxV9asvCpm2:LLp9oItfmf8Alm
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-