General
-
Target
0f7fff304e0fe1a4bc0ca5eef9d34cdb6d2b43a9.exe
-
Size
17KB
-
Sample
241119-pc6hts1jfm
-
MD5
f8a9322518123f8dfa7e2e4b02e21656
-
SHA1
0f7fff304e0fe1a4bc0ca5eef9d34cdb6d2b43a9
-
SHA256
ffea9176cfb8f8c009dfc8c1c4db6385e0155497dc42cd0e3dd356371c4089b8
-
SHA512
fca2e548bb333ac59a4803ab783c5b4bfb466c5f7f59bcb787675db7c4444beafae9fe97beeb272c680f1573f204b864cd06a95cfcfb863e15f4c489732d3bae
-
SSDEEP
384:OEEoLO56ayzcMj+uZvAc00EUGvQPCcmL6neqlkXMj/79Wx:RE8O56lcVuGv0TPCcfexX+79Wx
Static task
static1
Behavioral task
behavioral1
Sample
0f7fff304e0fe1a4bc0ca5eef9d34cdb6d2b43a9.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0f7fff304e0fe1a4bc0ca5eef9d34cdb6d2b43a9.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp_dns
190.130.88.59:4444
Targets
-
-
Target
0f7fff304e0fe1a4bc0ca5eef9d34cdb6d2b43a9.exe
-
Size
17KB
-
MD5
f8a9322518123f8dfa7e2e4b02e21656
-
SHA1
0f7fff304e0fe1a4bc0ca5eef9d34cdb6d2b43a9
-
SHA256
ffea9176cfb8f8c009dfc8c1c4db6385e0155497dc42cd0e3dd356371c4089b8
-
SHA512
fca2e548bb333ac59a4803ab783c5b4bfb466c5f7f59bcb787675db7c4444beafae9fe97beeb272c680f1573f204b864cd06a95cfcfb863e15f4c489732d3bae
-
SSDEEP
384:OEEoLO56ayzcMj+uZvAc00EUGvQPCcmL6neqlkXMj/79Wx:RE8O56lcVuGv0TPCcfexX+79Wx
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Blocklisted process makes network request
-