General
-
Target
4c20eecbbd02fdbca8971776289c4c0607c3e5c8cbce8687701d28ab1a8f99b5
-
Size
72KB
-
Sample
241112-1ty1vs1mez
-
MD5
b4c98ae51de878530323e44b515ac09d
-
SHA1
41ad8e7348b032834c535500d9947f01871ebd90
-
SHA256
4c20eecbbd02fdbca8971776289c4c0607c3e5c8cbce8687701d28ab1a8f99b5
-
SHA512
b71c3a44d8c1affb0b179d782b3da94c15d425e9ebccbbd15d316ef3646dbc44f17855ce7c089dff19b0d4204f6c1a2b4e38a9b392fa763ffbc9ec32928f1d83
-
SSDEEP
1536:IfzG2PkAQuxYaZGiek7e6H33Ce6lMb+KR0Nc8QsJq39:qzG2PkmxY6xekRXSeGe0Nc8QsC9
Behavioral task
behavioral1
Sample
4c20eecbbd02fdbca8971776289c4c0607c3e5c8cbce8687701d28ab1a8f99b5.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
4c20eecbbd02fdbca8971776289c4c0607c3e5c8cbce8687701d28ab1a8f99b5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
192.168.66.128:443
Targets
-
-
Target
4c20eecbbd02fdbca8971776289c4c0607c3e5c8cbce8687701d28ab1a8f99b5
-
Size
72KB
-
MD5
b4c98ae51de878530323e44b515ac09d
-
SHA1
41ad8e7348b032834c535500d9947f01871ebd90
-
SHA256
4c20eecbbd02fdbca8971776289c4c0607c3e5c8cbce8687701d28ab1a8f99b5
-
SHA512
b71c3a44d8c1affb0b179d782b3da94c15d425e9ebccbbd15d316ef3646dbc44f17855ce7c089dff19b0d4204f6c1a2b4e38a9b392fa763ffbc9ec32928f1d83
-
SSDEEP
1536:IfzG2PkAQuxYaZGiek7e6H33Ce6lMb+KR0Nc8QsJq39:qzG2PkmxY6xekRXSeGe0Nc8QsC9
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-