General
-
Target
a485a724a0797a0cae1bc7f59e0403a3b77d42afacbc579aae41c458dfea2b0b
-
Size
34KB
-
Sample
241205-1mjbtszmcj
-
MD5
ee86c554c2b0a1fd3b6b396970c0be5b
-
SHA1
a477f901a2e6c97a05f81c877f05144180e400f7
-
SHA256
a485a724a0797a0cae1bc7f59e0403a3b77d42afacbc579aae41c458dfea2b0b
-
SHA512
f8f32e22eb8d18f93225fe3d422e27a3f7c6e93a5692873b28251b8cea1a924baf45459d08be35af97ee7c7a3bf4b5c22eb2465dc04ebc39ff9e9623606bb0d3
-
SSDEEP
384:j2iSwvxjk+tV6L4Sivwre50j63+pz/nwQVlN3L:jZxw+tUdivnv+pHtL
Behavioral task
behavioral1
Sample
a485a724a0797a0cae1bc7f59e0403a3b77d42afacbc579aae41c458dfea2b0b.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a485a724a0797a0cae1bc7f59e0403a3b77d42afacbc579aae41c458dfea2b0b.doc
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/reverse_tcp
127.0.0.1:4444
Targets
-
-
Target
a485a724a0797a0cae1bc7f59e0403a3b77d42afacbc579aae41c458dfea2b0b
-
Size
34KB
-
MD5
ee86c554c2b0a1fd3b6b396970c0be5b
-
SHA1
a477f901a2e6c97a05f81c877f05144180e400f7
-
SHA256
a485a724a0797a0cae1bc7f59e0403a3b77d42afacbc579aae41c458dfea2b0b
-
SHA512
f8f32e22eb8d18f93225fe3d422e27a3f7c6e93a5692873b28251b8cea1a924baf45459d08be35af97ee7c7a3bf4b5c22eb2465dc04ebc39ff9e9623606bb0d3
-
SSDEEP
384:j2iSwvxjk+tV6L4Sivwre50j63+pz/nwQVlN3L:jZxw+tUdivnv+pHtL
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Process spawned suspicious child process
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
-