General
-
Target
2baecd6bbd065f930ef30eec978b20b3b8611884fd10852834e7fc593765ee75
-
Size
151KB
-
Sample
241212-zdpxksymhp
-
MD5
29ced56330073921e0bff677f98c06c4
-
SHA1
a7b92f8b3a43239ed70be0cde6989afec9b41630
-
SHA256
2baecd6bbd065f930ef30eec978b20b3b8611884fd10852834e7fc593765ee75
-
SHA512
0b71f34a72b3f2ee747d8c32a3df4125b5b18e2ae794dcc669a4b1354ec2084b320028d1b4a868ce5f1cf93e31bbb716e39f98ffb1868c4adbc0958666460910
-
SSDEEP
3072:6fktJbBiYBN6DQHKMk4ZU52XQckKDZMwuyoWVB22UipizpcbLt0gqHC4cLUEw:Uk/b/vKMVZU8JdOwqW722UipgcbRxqis
Static task
static1
Behavioral task
behavioral1
Sample
Transfer.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Transfer.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/reverse_http
http://89.197.154.116:7810/OGgACk8WohpIa0lqLzBQpQIBiTvAZrdP1D8niB7YqBY3pBjtYmWYJw1WQE1b54johKnf_2Na8Ev9r9AMjiuPjapALWcWpvyxUeyyd4afbejN3E1XqB5_041iqTXmxcKVjfJUOoqhxWbatZmmMI9D6UcbYSNUPD4DaSiVVP3p2OhuOWhsYcBPOYSQTYQjPNKrXbbYQOJ8axlN-Ud-iOXPGR16ZZxgTpE4MHvC_4czGI
Targets
-
-
Target
Transfer.exe
-
Size
292KB
-
MD5
ff69fbff0010db34c0ee5a506f4c4edd
-
SHA1
169029f0020cecac813206edb8256fe1e518d6d5
-
SHA256
92c11098030f01c5c024f7b9f026b9006d193c4ac5b1be6dae5cc54d17be1628
-
SHA512
f0a03ce79e282fd30f780fb8d0e379d33ca791bea8700bf84bd2645155482cce914b0580f6ce6f335539a41d1a60e387d83b7ce4f9c2c8660252a76555bb6760
-
SSDEEP
6144:e1o12lUr7EbaK1fw9mlH3hzo7DZJ/wDAUZlYm3UhM9l:eC1ZobTw9/DZJwDrPYmO
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-