General
-
Target
5d5b8308cb4e2b8953d0ae655fbf3280831791c6aab585baaffac755edccda2b
-
Size
84KB
-
Sample
241207-1v4mqs1nel
-
MD5
c03a7136157d7368cc6593e7123400d3
-
SHA1
da6a164c4aabbf2f650ef04a40921ebdc32f1fbe
-
SHA256
5d5b8308cb4e2b8953d0ae655fbf3280831791c6aab585baaffac755edccda2b
-
SHA512
290ccf748d6f74ce0c25d5440f2f0e98fac76e8b99edb81c49c547030e95f1da98217a430ab79e21186381c0e3e2be9a7e112d5d038b96ba587b6f594cad01ee
-
SSDEEP
1536:ZBgfmM2qygswi7+nVWQ0hF6Rlykl+/6bFLWxRr+jikaS8FzZBlRFJM6kbm5O:wHzZziMVPkKyO+CJQ+jikaS8zJiaO
Behavioral task
behavioral1
Sample
5d5b8308cb4e2b8953d0ae655fbf3280831791c6aab585baaffac755edccda2b.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5d5b8308cb4e2b8953d0ae655fbf3280831791c6aab585baaffac755edccda2b.xlsm
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/reverse_http
http://192.168.100.13:44863/96KM-ROoWJ5n6GbpAMFcbQ-spvwPN
Targets
-
-
Target
5d5b8308cb4e2b8953d0ae655fbf3280831791c6aab585baaffac755edccda2b
-
Size
84KB
-
MD5
c03a7136157d7368cc6593e7123400d3
-
SHA1
da6a164c4aabbf2f650ef04a40921ebdc32f1fbe
-
SHA256
5d5b8308cb4e2b8953d0ae655fbf3280831791c6aab585baaffac755edccda2b
-
SHA512
290ccf748d6f74ce0c25d5440f2f0e98fac76e8b99edb81c49c547030e95f1da98217a430ab79e21186381c0e3e2be9a7e112d5d038b96ba587b6f594cad01ee
-
SSDEEP
1536:ZBgfmM2qygswi7+nVWQ0hF6Rlykl+/6bFLWxRr+jikaS8FzZBlRFJM6kbm5O:wHzZziMVPkKyO+CJQ+jikaS8zJiaO
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-