General
-
Target
549129268147b307a6ea87d452d2dc8c11d5221c15c4510b8bca93ab911b145e
-
Size
28KB
-
Sample
241205-1l3zvatkcx
-
MD5
e8ecf92d1e99d8aa71dafc8445de7dda
-
SHA1
d5a66728282283cd37760b1ff481afc3b380cd2b
-
SHA256
549129268147b307a6ea87d452d2dc8c11d5221c15c4510b8bca93ab911b145e
-
SHA512
e9d77778e3717d711b12cdf36ebf0b2828ca30bf9de719d541fb852756b0b6742de9ae57e90eae116ad1163a7500859743560c7232970a9f76d3351da82f9cca
-
SSDEEP
192:tlLZEvA+6/6r8px8SmvowzxigAFx9O5tPKnZJ1IzBNQJDLpmNatUzmbm:j8iS8px8SMDigoUtitsNQtLM0tK
Static task
static1
Behavioral task
behavioral1
Sample
549129268147b307a6ea87d452d2dc8c11d5221c15c4510b8bca93ab911b145e.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
549129268147b307a6ea87d452d2dc8c11d5221c15c4510b8bca93ab911b145e.doc
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/download_exec
http://192.168.8.128:80/6Xlb
- headers User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1)
Targets
-
-
Target
549129268147b307a6ea87d452d2dc8c11d5221c15c4510b8bca93ab911b145e
-
Size
28KB
-
MD5
e8ecf92d1e99d8aa71dafc8445de7dda
-
SHA1
d5a66728282283cd37760b1ff481afc3b380cd2b
-
SHA256
549129268147b307a6ea87d452d2dc8c11d5221c15c4510b8bca93ab911b145e
-
SHA512
e9d77778e3717d711b12cdf36ebf0b2828ca30bf9de719d541fb852756b0b6742de9ae57e90eae116ad1163a7500859743560c7232970a9f76d3351da82f9cca
-
SSDEEP
192:tlLZEvA+6/6r8px8SmvowzxigAFx9O5tPKnZJ1IzBNQJDLpmNatUzmbm:j8iS8px8SMDigoUtitsNQtLM0tK
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Process spawned suspicious child process
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
-