General
-
Target
1.ps1
-
Size
166B
-
Sample
241123-1shbqavldr
-
MD5
046722bd15c75486ec47c89c8088b707
-
SHA1
34a311d0a8fc2d7b7d4d340f7735294086fbced0
-
SHA256
b6bf0cf1c96d26ce76894e7fe5d4e599f32021c09213e19ac70cfe87b81eff89
-
SHA512
b2b94bc1a81660b1c1b78ec8d0244460445ff26e5a7638970da4655264320373f36896f72f609c1d67a6d4faefb3ea86d83ab00f73166f253d867a818b4a94d8
Static task
static1
Behavioral task
behavioral1
Sample
1.ps1
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
1.ps1
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
metasploit_stager
148.66.61.82:80
Targets
-
-
Target
1.ps1
-
Size
166B
-
MD5
046722bd15c75486ec47c89c8088b707
-
SHA1
34a311d0a8fc2d7b7d4d340f7735294086fbced0
-
SHA256
b6bf0cf1c96d26ce76894e7fe5d4e599f32021c09213e19ac70cfe87b81eff89
-
SHA512
b2b94bc1a81660b1c1b78ec8d0244460445ff26e5a7638970da4655264320373f36896f72f609c1d67a6d4faefb3ea86d83ab00f73166f253d867a818b4a94d8
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Blocklisted process makes network request
-