General
-
Target
99d8695eee60a5a2aa4834e8292d3020bc4b15b48161ed9c03dd735c21f1837bN.exe
-
Size
124KB
-
Sample
241113-qmrm4asele
-
MD5
33dd8c543dcec79face3e56554c36bc0
-
SHA1
fe0fe6fa239ce64c2e4fb42a23f13903145e215c
-
SHA256
99d8695eee60a5a2aa4834e8292d3020bc4b15b48161ed9c03dd735c21f1837b
-
SHA512
ae6a2abd2969e39127a1a237f76406a63f56b72313e407b7cccff961629eb0c847cadc5dd22fc70764a1e52545e8cf07d01b9e488a162c05f4000c4a2552a2da
-
SSDEEP
1536:IB+ctOey9p7rtJs0xuBCZlc/iDrH05fTvOMb+KR0Nc8QsJq3:e+ctTU7rLsBkZlRDqfTvOe0Nc8QsC
Behavioral task
behavioral1
Sample
99d8695eee60a5a2aa4834e8292d3020bc4b15b48161ed9c03dd735c21f1837bN.exe
Resource
win7-20240729-en
Malware Config
Extracted
metasploit
windows/download_exec
http://raw.githubusercontent.com:443/Fabian066/readsservercommand0/refs/heads/main/getter.exe
Targets
-
-
Target
99d8695eee60a5a2aa4834e8292d3020bc4b15b48161ed9c03dd735c21f1837bN.exe
-
Size
124KB
-
MD5
33dd8c543dcec79face3e56554c36bc0
-
SHA1
fe0fe6fa239ce64c2e4fb42a23f13903145e215c
-
SHA256
99d8695eee60a5a2aa4834e8292d3020bc4b15b48161ed9c03dd735c21f1837b
-
SHA512
ae6a2abd2969e39127a1a237f76406a63f56b72313e407b7cccff961629eb0c847cadc5dd22fc70764a1e52545e8cf07d01b9e488a162c05f4000c4a2552a2da
-
SSDEEP
1536:IB+ctOey9p7rtJs0xuBCZlc/iDrH05fTvOMb+KR0Nc8QsJq3:e+ctTU7rLsBkZlRDqfTvOe0Nc8QsC
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
XMRig Miner payload
-
Xmrig family
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-