General
-
Target
7cc1f9b3600a2c34b40fe42117b8ed678eca91312730d8435def4b356037c680
-
Size
83KB
-
Sample
241106-zycsrayclj
-
MD5
5c598af465c80c34768fb84ed8e5be07
-
SHA1
a112304563fc6aa0132f2f5d396c6438849a836a
-
SHA256
7cc1f9b3600a2c34b40fe42117b8ed678eca91312730d8435def4b356037c680
-
SHA512
0f6664e279645e2f2b39239afca6982c4d8c69e2fd2c80617897240fa37c9d2fa0e09b347655e505db54b70b8eb6f646fa1096fff76c8db470fcd251ada4b7b3
-
SSDEEP
1536:UX+WqQuctgdEmHVJZtQ1tSW+fIwMyPiEHB8nrdFIILILBZUymgicOXClW:I+X8YdDZFM0iISrdFjEBamdOCE
Static task
static1
Behavioral task
behavioral1
Sample
7cc1f9b3600a2c34b40fe42117b8ed678eca91312730d8435def4b356037c680.docm
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7cc1f9b3600a2c34b40fe42117b8ed678eca91312730d8435def4b356037c680.docm
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/reverse_tcp
192.168.100.142:4444
Targets
-
-
Target
7cc1f9b3600a2c34b40fe42117b8ed678eca91312730d8435def4b356037c680
-
Size
83KB
-
MD5
5c598af465c80c34768fb84ed8e5be07
-
SHA1
a112304563fc6aa0132f2f5d396c6438849a836a
-
SHA256
7cc1f9b3600a2c34b40fe42117b8ed678eca91312730d8435def4b356037c680
-
SHA512
0f6664e279645e2f2b39239afca6982c4d8c69e2fd2c80617897240fa37c9d2fa0e09b347655e505db54b70b8eb6f646fa1096fff76c8db470fcd251ada4b7b3
-
SSDEEP
1536:UX+WqQuctgdEmHVJZtQ1tSW+fIwMyPiEHB8nrdFIILILBZUymgicOXClW:I+X8YdDZFM0iISrdFjEBamdOCE
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE
-
Loads dropped DLL
-