General
-
Target
18917860a380ce00275fc6e2be1edb1065bd8589e69361822ce8bee9382de7f6
-
Size
83KB
-
Sample
241112-12xg1awjbq
-
MD5
e690c50a4bdfe105c8689e8b1bda9a62
-
SHA1
5b7857d816c1dde669fae82d2eb1b63832968a79
-
SHA256
18917860a380ce00275fc6e2be1edb1065bd8589e69361822ce8bee9382de7f6
-
SHA512
933bfaa2098ab58d7016d8b5fe1989924c9ce93de8ec7bbd5e5ff498c33a11cdde721f196e5e74e0be3edfbb2fa0aaf43550f9e0b15088a6bd6724182cf47b1e
-
SSDEEP
1536:2m+WqQuctgdrmM8o0BE3Nswkj+MB4jUgfASaAQ93MPinoTc0jUg8ifOXCla:H+X8Y3j9scMx5LAYMPinq8WOCU
Static task
static1
Behavioral task
behavioral1
Sample
18917860a380ce00275fc6e2be1edb1065bd8589e69361822ce8bee9382de7f6.docm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
18917860a380ce00275fc6e2be1edb1065bd8589e69361822ce8bee9382de7f6.docm
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/shell_bind_tcp
Targets
-
-
Target
18917860a380ce00275fc6e2be1edb1065bd8589e69361822ce8bee9382de7f6
-
Size
83KB
-
MD5
e690c50a4bdfe105c8689e8b1bda9a62
-
SHA1
5b7857d816c1dde669fae82d2eb1b63832968a79
-
SHA256
18917860a380ce00275fc6e2be1edb1065bd8589e69361822ce8bee9382de7f6
-
SHA512
933bfaa2098ab58d7016d8b5fe1989924c9ce93de8ec7bbd5e5ff498c33a11cdde721f196e5e74e0be3edfbb2fa0aaf43550f9e0b15088a6bd6724182cf47b1e
-
SSDEEP
1536:2m+WqQuctgdrmM8o0BE3Nswkj+MB4jUgfASaAQ93MPinoTc0jUg8ifOXCla:H+X8Y3j9scMx5LAYMPinq8WOCU
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE
-
Loads dropped DLL
-