General
-
Target
9c440ce5374b11c0a21cc567d9f68c0594366e286675f23ef535542708bf5053
-
Size
83KB
-
Sample
241202-1pkyfavjhs
-
MD5
8b953a6aa2ac81a5d0a81d229efbab74
-
SHA1
b1d969d29ad7242d673daef8d7999358d8f4eca5
-
SHA256
9c440ce5374b11c0a21cc567d9f68c0594366e286675f23ef535542708bf5053
-
SHA512
03b14aadb90c84a4aa0363e00dbee55b40b8b5bf1efc54228a6db50dd668794951488ae8721e68f43bdb001b3e95dc4b41115bf51a3509907b91d4c0d7318e50
-
SSDEEP
1536:cn+WqQuctgd8mz1RSOWMrqYrF8CqY6kbBQIGg1e05rx/tssTmzgigOXClG:A+X8YFH3rqYRRqJkAulasacJOCU
Static task
static1
Behavioral task
behavioral1
Sample
9c440ce5374b11c0a21cc567d9f68c0594366e286675f23ef535542708bf5053.docm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9c440ce5374b11c0a21cc567d9f68c0594366e286675f23ef535542708bf5053.docm
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/reverse_tcp
10.211.55.3:4444
Targets
-
-
Target
9c440ce5374b11c0a21cc567d9f68c0594366e286675f23ef535542708bf5053
-
Size
83KB
-
MD5
8b953a6aa2ac81a5d0a81d229efbab74
-
SHA1
b1d969d29ad7242d673daef8d7999358d8f4eca5
-
SHA256
9c440ce5374b11c0a21cc567d9f68c0594366e286675f23ef535542708bf5053
-
SHA512
03b14aadb90c84a4aa0363e00dbee55b40b8b5bf1efc54228a6db50dd668794951488ae8721e68f43bdb001b3e95dc4b41115bf51a3509907b91d4c0d7318e50
-
SSDEEP
1536:cn+WqQuctgd8mz1RSOWMrqYrF8CqY6kbBQIGg1e05rx/tssTmzgigOXClG:A+X8YFH3rqYRRqJkAulasacJOCU
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE
-
Loads dropped DLL
-