General
-
Target
b06f5d3ffc537f6a1279cec8ce0f35bf4dcbf6e024b20e125cb3632af3dd6f19
-
Size
273KB
-
Sample
241106-k7g2haxenc
-
MD5
5f095f61d90068a5bef8864a42d2db93
-
SHA1
4c3b1aa82d6d816b97a3b9d88c6991c0ef3ed36d
-
SHA256
b06f5d3ffc537f6a1279cec8ce0f35bf4dcbf6e024b20e125cb3632af3dd6f19
-
SHA512
4ebc18bcaa2b2dd5d5c11d54630e123f73ed1010a697c8e57521f049570294c721e6b4afa96f72da8d0cb37f700508b4dd635e32fb4192c1581b42931995bb38
-
SSDEEP
3072:aN/bNf5vySI8nolTz6EfbPw861SsM9t95ZBfqp3q6OB5GAa6TojkpF/R7ObtQvp2:S/Zf5vy6K36EfbPw861r1e5G562kpiD
Behavioral task
behavioral1
Sample
b06f5d3ffc537f6a1279cec8ce0f35bf4dcbf6e024b20e125cb3632af3dd6f19.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b06f5d3ffc537f6a1279cec8ce0f35bf4dcbf6e024b20e125cb3632af3dd6f19.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/download_exec
http://192.168.150.128:8080/Signin
- headers Connection: close Sec-Fetch-Site: same-origin Sec-Fetch-Mode: navigate Sec-Fetch-User: ?1 Sec-Detch-Dest: document User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 12_1_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Mobile/16C104
Targets
-
-
Target
b06f5d3ffc537f6a1279cec8ce0f35bf4dcbf6e024b20e125cb3632af3dd6f19
-
Size
273KB
-
MD5
5f095f61d90068a5bef8864a42d2db93
-
SHA1
4c3b1aa82d6d816b97a3b9d88c6991c0ef3ed36d
-
SHA256
b06f5d3ffc537f6a1279cec8ce0f35bf4dcbf6e024b20e125cb3632af3dd6f19
-
SHA512
4ebc18bcaa2b2dd5d5c11d54630e123f73ed1010a697c8e57521f049570294c721e6b4afa96f72da8d0cb37f700508b4dd635e32fb4192c1581b42931995bb38
-
SSDEEP
3072:aN/bNf5vySI8nolTz6EfbPw861SsM9t95ZBfqp3q6OB5GAa6TojkpF/R7ObtQvp2:S/Zf5vy6K36EfbPw861r1e5G562kpiD
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-