General
-
Target
d56bfaf953a048a4fd880b78bf4ba65e828034f34cb05ce8af933a72db192bc2.exe
-
Size
124KB
-
Sample
241205-fvctsszpew
-
MD5
c6bcbc73b09ece2ca1642b59b00a0186
-
SHA1
7bcd9c5c794918c43721d7b3f3f19da8a824e93a
-
SHA256
d56bfaf953a048a4fd880b78bf4ba65e828034f34cb05ce8af933a72db192bc2
-
SHA512
66cd49736cf0348ed23bbcba9e53ff16bcf17de52de091d4b0086fbc5eed1e3d23db0f08d0050a31d4da6c28961c4205c136c5b4eac03060e2bea96d27dc54ee
-
SSDEEP
1536:IMO1HILNg8XVqhZdGaP+MesUMb+KR0Nc8QsJq3X:OEhpSesUe0Nc8QsCX
Behavioral task
behavioral1
Sample
d56bfaf953a048a4fd880b78bf4ba65e828034f34cb05ce8af933a72db192bc2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d56bfaf953a048a4fd880b78bf4ba65e828034f34cb05ce8af933a72db192bc2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
10.10.10.10:3333
Targets
-
-
Target
d56bfaf953a048a4fd880b78bf4ba65e828034f34cb05ce8af933a72db192bc2.exe
-
Size
124KB
-
MD5
c6bcbc73b09ece2ca1642b59b00a0186
-
SHA1
7bcd9c5c794918c43721d7b3f3f19da8a824e93a
-
SHA256
d56bfaf953a048a4fd880b78bf4ba65e828034f34cb05ce8af933a72db192bc2
-
SHA512
66cd49736cf0348ed23bbcba9e53ff16bcf17de52de091d4b0086fbc5eed1e3d23db0f08d0050a31d4da6c28961c4205c136c5b4eac03060e2bea96d27dc54ee
-
SSDEEP
1536:IMO1HILNg8XVqhZdGaP+MesUMb+KR0Nc8QsJq3X:OEhpSesUe0Nc8QsCX
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-