General
-
Target
a0d38a85c78a89886c93e627b25e888f79078e6751d4ef5e0aa918ef7663cbbd
-
Size
1.5MB
-
Sample
241206-naqh6avjhs
-
MD5
8373d49cba039770879b66b45257ce51
-
SHA1
3335b6adf81c41269a8267209244904967e867d7
-
SHA256
a0d38a85c78a89886c93e627b25e888f79078e6751d4ef5e0aa918ef7663cbbd
-
SHA512
5fe691958ea6822a1ee0e595495288c776e3718fddbd25995081f359a1f1d3f734379ab37f5706ed25a58a70c16c690d637a0cbbfe422aec094e45b3a27e7ae9
-
SSDEEP
24576:b5ZWs+OZVEWry8AFHG3zmr1BE3FOwIPSXotdjrpUT8qU0m:1ZB1G8YmOGFO/tp/j0m
Static task
static1
Behavioral task
behavioral1
Sample
a0d38a85c78a89886c93e627b25e888f79078e6751d4ef5e0aa918ef7663cbbd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a0d38a85c78a89886c93e627b25e888f79078e6751d4ef5e0aa918ef7663cbbd.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/reverse_tcp
192.168.80.136:4444
Targets
-
-
Target
a0d38a85c78a89886c93e627b25e888f79078e6751d4ef5e0aa918ef7663cbbd
-
Size
1.5MB
-
MD5
8373d49cba039770879b66b45257ce51
-
SHA1
3335b6adf81c41269a8267209244904967e867d7
-
SHA256
a0d38a85c78a89886c93e627b25e888f79078e6751d4ef5e0aa918ef7663cbbd
-
SHA512
5fe691958ea6822a1ee0e595495288c776e3718fddbd25995081f359a1f1d3f734379ab37f5706ed25a58a70c16c690d637a0cbbfe422aec094e45b3a27e7ae9
-
SSDEEP
24576:b5ZWs+OZVEWry8AFHG3zmr1BE3FOwIPSXotdjrpUT8qU0m:1ZB1G8YmOGFO/tp/j0m
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-