General
-
Target
Bypass2.bat
-
Size
6KB
-
Sample
241115-wtwhhsyhqk
-
MD5
3e80d6cc87e7d4207fb3e7dc9b70d226
-
SHA1
d39cfe382fbe9b7cde6dff006e1c08089508f1ae
-
SHA256
06e1fa53ef3878101c1591ec3fa629e766d3fe47c142a6164b2aabcd397359bd
-
SHA512
4dd271b014c4948ade1f7a46f3c3e5c6fa0ef9f8cca77cac29ac3c4ae0f3b44e455a697b7b3eeb9feca55ab539a3448556ba9b1afa1dd2d5aaafb80b5c7061a5
-
SSDEEP
192:+n2jh1hqTjRjZ5mpwGHWf540neCmNDPVMCKF6hdC:+n2jh1hsj6sRBnMNDPVM0hdC
Static task
static1
Behavioral task
behavioral1
Sample
Bypass2.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Bypass2.bat
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/reverse_tcp
89.197.154.116:7810
Targets
-
-
Target
Bypass2.bat
-
Size
6KB
-
MD5
3e80d6cc87e7d4207fb3e7dc9b70d226
-
SHA1
d39cfe382fbe9b7cde6dff006e1c08089508f1ae
-
SHA256
06e1fa53ef3878101c1591ec3fa629e766d3fe47c142a6164b2aabcd397359bd
-
SHA512
4dd271b014c4948ade1f7a46f3c3e5c6fa0ef9f8cca77cac29ac3c4ae0f3b44e455a697b7b3eeb9feca55ab539a3448556ba9b1afa1dd2d5aaafb80b5c7061a5
-
SSDEEP
192:+n2jh1hqTjRjZ5mpwGHWf540neCmNDPVMCKF6hdC:+n2jh1hsj6sRBnMNDPVM0hdC
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Blocklisted process makes network request
-