General
-
Target
Document.bat
-
Size
6KB
-
Sample
241115-wvzassygma
-
MD5
6bdc18d89eac8169f6783f768259ea94
-
SHA1
fa8d50f329b569909342fec35ec5e85eb1fc7e17
-
SHA256
00e92245ffdb75ba3700073c59eb3df585fb87f99d6eacb874899a471fbe4c6d
-
SHA512
ff8341450506a72910443a3ba53d3039b6a0e60930afed7f0ddcf40aa9f6a0d648fe83fa7171cae4fbfb3eff8354e5b498b91005b1d83790a97118cbf119c68b
-
SSDEEP
192:+n2jh1hqT2ZV/2aBTmmXCxsUo4/cB8FScgIJe2dHhW:+n2jh1hs2V9kmXCxTo4hYcgIdHhW
Static task
static1
Behavioral task
behavioral1
Sample
Document.bat
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Document.bat
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/reverse_tcp
89.197.154.116:7810
Targets
-
-
Target
Document.bat
-
Size
6KB
-
MD5
6bdc18d89eac8169f6783f768259ea94
-
SHA1
fa8d50f329b569909342fec35ec5e85eb1fc7e17
-
SHA256
00e92245ffdb75ba3700073c59eb3df585fb87f99d6eacb874899a471fbe4c6d
-
SHA512
ff8341450506a72910443a3ba53d3039b6a0e60930afed7f0ddcf40aa9f6a0d648fe83fa7171cae4fbfb3eff8354e5b498b91005b1d83790a97118cbf119c68b
-
SSDEEP
192:+n2jh1hqT2ZV/2aBTmmXCxsUo4/cB8FScgIJe2dHhW:+n2jh1hs2V9kmXCxTo4hYcgIdHhW
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Blocklisted process makes network request
-