General
-
Target
0d9556e062bb62543c0a74d91606a09884d4ff0e009fc322c4d1a7fdb1a40d26
-
Size
92KB
-
Sample
241112-ztr2wa1fjn
-
MD5
859c16166c6843d9b81d646f9f7a40f5
-
SHA1
dcd5957e6a2b7c4a76baa7d1fd1dc450c32202fc
-
SHA256
0d9556e062bb62543c0a74d91606a09884d4ff0e009fc322c4d1a7fdb1a40d26
-
SHA512
31a8470c66dacd59e493f41f9da06d19ed09652ce10635027aa61f4fe7d046a1575177ce33be6e64081b26b8620f95497f16b7715f6678ff1f9d122d3da4d2bf
-
SSDEEP
1536:L1i9+e44s4kQbvkX65msSRSse0+gkEjw+pkB02OJ3Wt+A50UHHlmENVOXCl0:L49XPJrxUTRSV0+T7CkGVJmUAu0HjNVg
Static task
static1
Behavioral task
behavioral1
Sample
0d9556e062bb62543c0a74d91606a09884d4ff0e009fc322c4d1a7fdb1a40d26.docm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0d9556e062bb62543c0a74d91606a09884d4ff0e009fc322c4d1a7fdb1a40d26.docm
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/reverse_tcp
10.113.1.193:4444
Targets
-
-
Target
0d9556e062bb62543c0a74d91606a09884d4ff0e009fc322c4d1a7fdb1a40d26
-
Size
92KB
-
MD5
859c16166c6843d9b81d646f9f7a40f5
-
SHA1
dcd5957e6a2b7c4a76baa7d1fd1dc450c32202fc
-
SHA256
0d9556e062bb62543c0a74d91606a09884d4ff0e009fc322c4d1a7fdb1a40d26
-
SHA512
31a8470c66dacd59e493f41f9da06d19ed09652ce10635027aa61f4fe7d046a1575177ce33be6e64081b26b8620f95497f16b7715f6678ff1f9d122d3da4d2bf
-
SSDEEP
1536:L1i9+e44s4kQbvkX65msSRSse0+gkEjw+pkB02OJ3Wt+A50UHHlmENVOXCl0:L49XPJrxUTRSV0+T7CkGVJmUAu0HjNVg
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE
-
Loads dropped DLL
-