General
-
Target
749b8c2a8cb6d549ee32721f45484329a57c8a8b6c9a231cc5c9c379bc901f11.exe
-
Size
14KB
-
Sample
241204-jq9vhstnak
-
MD5
44a9f9f7c7fdce89dce6b350ebcaa825
-
SHA1
c37584aeb7dc992b56dd2b35f1571fbdab10e64a
-
SHA256
749b8c2a8cb6d549ee32721f45484329a57c8a8b6c9a231cc5c9c379bc901f11
-
SHA512
6579336bc44e40396c7cfe1aaeabe18f99bb28d19e93c44cb83d7fd83876e10d13e5526268958402dc55bd04c9e0c06af6e2deea56931f623e15052e19d40248
-
SSDEEP
192:Urmb4+kKb18RebYNeUtwCINEmMUThL/YJ6EEn9sTZAAZCMF:Ur6usyebVUtwfMOjYscAXS
Behavioral task
behavioral1
Sample
749b8c2a8cb6d549ee32721f45484329a57c8a8b6c9a231cc5c9c379bc901f11.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
749b8c2a8cb6d549ee32721f45484329a57c8a8b6c9a231cc5c9c379bc901f11.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/shell_reverse_tcp
192.168.10.135:4444
Targets
-
-
Target
749b8c2a8cb6d549ee32721f45484329a57c8a8b6c9a231cc5c9c379bc901f11.exe
-
Size
14KB
-
MD5
44a9f9f7c7fdce89dce6b350ebcaa825
-
SHA1
c37584aeb7dc992b56dd2b35f1571fbdab10e64a
-
SHA256
749b8c2a8cb6d549ee32721f45484329a57c8a8b6c9a231cc5c9c379bc901f11
-
SHA512
6579336bc44e40396c7cfe1aaeabe18f99bb28d19e93c44cb83d7fd83876e10d13e5526268958402dc55bd04c9e0c06af6e2deea56931f623e15052e19d40248
-
SSDEEP
192:Urmb4+kKb18RebYNeUtwCINEmMUThL/YJ6EEn9sTZAAZCMF:Ur6usyebVUtwfMOjYscAXS
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-