General
-
Target
42e55c8a45200dde96062e5899518733f8f7c504c72fd4b86a793ba22dec3dcc
-
Size
647KB
-
Sample
241202-zkqsfsxphm
-
MD5
74002a194360682b006cca283e1cf4e8
-
SHA1
6c037c51df859c1dee31ef88300a8a1a325c30e0
-
SHA256
42e55c8a45200dde96062e5899518733f8f7c504c72fd4b86a793ba22dec3dcc
-
SHA512
870bbfab1508d9dee43fbb51e1e5be1956274f143fee0095e8f11fec3e4c6ae9a4c20c1a38566d415b62d1b0f9b55d9dfb9b239c93e7f2aae7b6e91eaad1c48a
-
SSDEEP
12288:cyveQB/fTHIGaPkKEYzURNAwbAgli5/XoEQZOvG/C+O4+S8HiK425O9AJ:cuDXTIGaPhEYzUzA065ovZHtOOML89AJ
Static task
static1
Behavioral task
behavioral1
Sample
42e55c8a45200dde96062e5899518733f8f7c504c72fd4b86a793ba22dec3dcc.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
42e55c8a45200dde96062e5899518733f8f7c504c72fd4b86a793ba22dec3dcc.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/reverse_tcp
192.168.1.64:1479
Targets
-
-
Target
42e55c8a45200dde96062e5899518733f8f7c504c72fd4b86a793ba22dec3dcc
-
Size
647KB
-
MD5
74002a194360682b006cca283e1cf4e8
-
SHA1
6c037c51df859c1dee31ef88300a8a1a325c30e0
-
SHA256
42e55c8a45200dde96062e5899518733f8f7c504c72fd4b86a793ba22dec3dcc
-
SHA512
870bbfab1508d9dee43fbb51e1e5be1956274f143fee0095e8f11fec3e4c6ae9a4c20c1a38566d415b62d1b0f9b55d9dfb9b239c93e7f2aae7b6e91eaad1c48a
-
SSDEEP
12288:cyveQB/fTHIGaPkKEYzURNAwbAgli5/XoEQZOvG/C+O4+S8HiK425O9AJ:cuDXTIGaPhEYzUzA065ovZHtOOML89AJ
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-