General
-
Target
ignition.vbs
-
Size
7KB
-
Sample
241116-v8detavkbn
-
MD5
b64ade0da62a91e454083bdd1941334a
-
SHA1
acda54750b9aaa12f1d796e49e34649834e5add9
-
SHA256
8dbe43f829e5570159a6d7e09da465b16894a9209203cc11620f974a73140568
-
SHA512
5b0fb691cf8db530fc7a06a977300709576e44049fb89b538aea68867b3250750fdffcd999018ee80e9a2926f476e1d1154b192929a4bb0830dc0abb8b66f16b
-
SSDEEP
192:EDZskGMOU0d02GNChlRD2YtYDdnlpzg/VLH:STGM9e02ECB2YWrpstLH
Static task
static1
Behavioral task
behavioral1
Sample
ignition.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ignition.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_http
http://89.197.154.116:7810/eHF-4tVTnNnq3-vejdLJogPiK3ZJIfBMUU62cmVlE9wjtuWSickS7QKt5X9Hh9rbWOGSx3mSkw2thVfP2JbI7rn_FcQhaZ3C
Targets
-
-
Target
ignition.vbs
-
Size
7KB
-
MD5
b64ade0da62a91e454083bdd1941334a
-
SHA1
acda54750b9aaa12f1d796e49e34649834e5add9
-
SHA256
8dbe43f829e5570159a6d7e09da465b16894a9209203cc11620f974a73140568
-
SHA512
5b0fb691cf8db530fc7a06a977300709576e44049fb89b538aea68867b3250750fdffcd999018ee80e9a2926f476e1d1154b192929a4bb0830dc0abb8b66f16b
-
SSDEEP
192:EDZskGMOU0d02GNChlRD2YtYDdnlpzg/VLH:STGM9e02ECB2YWrpstLH
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-