General
-
Target
c2e66bdb2b01f935b718be80a63a6f4f57010c597186e2636a8ea039cb778ff5
-
Size
72KB
-
Sample
240926-cchqjstcqe
-
MD5
9d1def94834e2627769bfa8896caa2f6
-
SHA1
bd01412e3923e5e1b35508810df9e437a2c4c3fb
-
SHA256
c2e66bdb2b01f935b718be80a63a6f4f57010c597186e2636a8ea039cb778ff5
-
SHA512
44519acc6ddbb62b5e06c14e7307f94f274558820da02f8c7b8f5d2a17e205aba9dd22462a760b2a59810c595684f1d2b682ab204ccaccc524d7c1863b2f0c30
-
SSDEEP
1536:IW9McbNgsyNtghENIfXb47rOf+3LrMb+KR0Nc8QsJq39:DMc6sm+hQIT47rzXe0Nc8QsC9
Behavioral task
behavioral1
Sample
c2e66bdb2b01f935b718be80a63a6f4f57010c597186e2636a8ea039cb778ff5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c2e66bdb2b01f935b718be80a63a6f4f57010c597186e2636a8ea039cb778ff5.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
192.168.182.128:443
Targets
-
-
Target
c2e66bdb2b01f935b718be80a63a6f4f57010c597186e2636a8ea039cb778ff5
-
Size
72KB
-
MD5
9d1def94834e2627769bfa8896caa2f6
-
SHA1
bd01412e3923e5e1b35508810df9e437a2c4c3fb
-
SHA256
c2e66bdb2b01f935b718be80a63a6f4f57010c597186e2636a8ea039cb778ff5
-
SHA512
44519acc6ddbb62b5e06c14e7307f94f274558820da02f8c7b8f5d2a17e205aba9dd22462a760b2a59810c595684f1d2b682ab204ccaccc524d7c1863b2f0c30
-
SSDEEP
1536:IW9McbNgsyNtghENIfXb47rOf+3LrMb+KR0Nc8QsJq39:DMc6sm+hQIT47rzXe0Nc8QsC9
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-