General
-
Target
1a2b391b7fb600d2f3a59fde96dac16a65ab6965dd50ecf2a1fcb9da32e3e61a
-
Size
85KB
-
Sample
241113-zlagvsyfng
-
MD5
0b05185b573be3047418df461bccc7ee
-
SHA1
0edbd52277d0e3ad79e1f2a4303e8f6dc4efd7f7
-
SHA256
1a2b391b7fb600d2f3a59fde96dac16a65ab6965dd50ecf2a1fcb9da32e3e61a
-
SHA512
02edf807fd03b618894f57420aca57104e43e4ac72adfbd8f194e07dca0a6f0782ad535672788e7ddd68d0e8d109cc64e5362c0b806a6c7eebd9698fab2f6b3c
-
SSDEEP
1536:qK54ncGglKTqtfpGIfX1O9B0gYy+KBumh00zhDl17AsWvDBcdPSaxGvZE/:7SwTvfXzy+KEm3lvPSaxGvZE/
Behavioral task
behavioral1
Sample
1a2b391b7fb600d2f3a59fde96dac16a65ab6965dd50ecf2a1fcb9da32e3e61a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1a2b391b7fb600d2f3a59fde96dac16a65ab6965dd50ecf2a1fcb9da32e3e61a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
192.168.8.219:3333
Targets
-
-
Target
1a2b391b7fb600d2f3a59fde96dac16a65ab6965dd50ecf2a1fcb9da32e3e61a
-
Size
85KB
-
MD5
0b05185b573be3047418df461bccc7ee
-
SHA1
0edbd52277d0e3ad79e1f2a4303e8f6dc4efd7f7
-
SHA256
1a2b391b7fb600d2f3a59fde96dac16a65ab6965dd50ecf2a1fcb9da32e3e61a
-
SHA512
02edf807fd03b618894f57420aca57104e43e4ac72adfbd8f194e07dca0a6f0782ad535672788e7ddd68d0e8d109cc64e5362c0b806a6c7eebd9698fab2f6b3c
-
SSDEEP
1536:qK54ncGglKTqtfpGIfX1O9B0gYy+KBumh00zhDl17AsWvDBcdPSaxGvZE/:7SwTvfXzy+KEm3lvPSaxGvZE/
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-