General
-
Target
Transfer-https.vbs
-
Size
7KB
-
Sample
241121-r6t31asqgv
-
MD5
e2f4a3c6e7570b4424089b24b059c9d0
-
SHA1
19c12a30f1cde384d948d32d1efa6f8a541e2a60
-
SHA256
44fd76bed4f91723940931c035a1e92f7d26d7c94dabd15f2e4a8db4f6e48273
-
SHA512
646e2cd0517745c4b36a3178edd8f48fe46eb29a2053d83f6beb61d9e5205cc97d1a7f9a65ea0190044b87b1275d998779025d7ede2253b455782d5e40e8c0f8
-
SSDEEP
96:ZGze5ePQfJEgaGscxriEto+TE9sfQcHOB7uczr05LaGejhVPPCyCsB3fD+r2:UzezgfEtoRGocHOBDzr05KbPKyNBG2
Static task
static1
Behavioral task
behavioral1
Sample
Transfer-https.vbs
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Transfer-https.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_http
http://89.197.154.116:7810/GHCSKLHA62xAo0GiJ65tlwmFvMO6tQNKeTswMuKxpybsim_N2RnNTId_j8dnBmA9vnYOyNR6EU7eXYS6AY-Rox46MWUiLVByUmCfxHjNCsvWTIsFuGs9e3XKhc2dJ6Jls10lHzhDwU0eh84XVkCbmUwBJfgF33CNXlpD8tpFnQKUyLbbyQTF_Cn32t6uqwBi89JgBGKEY_FfUBSCI4FljPsd9uXGcHm2BThT
Targets
-
-
Target
Transfer-https.vbs
-
Size
7KB
-
MD5
e2f4a3c6e7570b4424089b24b059c9d0
-
SHA1
19c12a30f1cde384d948d32d1efa6f8a541e2a60
-
SHA256
44fd76bed4f91723940931c035a1e92f7d26d7c94dabd15f2e4a8db4f6e48273
-
SHA512
646e2cd0517745c4b36a3178edd8f48fe46eb29a2053d83f6beb61d9e5205cc97d1a7f9a65ea0190044b87b1275d998779025d7ede2253b455782d5e40e8c0f8
-
SSDEEP
96:ZGze5ePQfJEgaGscxriEto+TE9sfQcHOB7uczr05LaGejhVPPCyCsB3fD+r2:UzezgfEtoRGocHOBDzr05KbPKyNBG2
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-