General
-
Target
dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe
-
Size
201KB
-
Sample
241231-rlp9bawpfk
-
MD5
bf8a7b506a5f26093e63a800fef9e100
-
SHA1
d0b12fc85d0ec865ca36c51e5b78de5622f3f8fc
-
SHA256
dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b
-
SHA512
7e2fa195d328c62351bca4b13bc7fcade72b57693fea499d21d4829eb184e1d6febe269eea3c3aa64259095abbf33371177ac9be3ce5229985cba57be2c472dd
-
SSDEEP
3072:CaDpZ+xJi1hHw7U3zNwP6uRw8LL260748sgCCn/vSPWn3CwE56JdoSh7+AgeHXoj:CSvhHw7cfrTPNCwEYJdlQAgR1N
Static task
static1
Behavioral task
behavioral1
Sample
dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe
-
Size
201KB
-
MD5
bf8a7b506a5f26093e63a800fef9e100
-
SHA1
d0b12fc85d0ec865ca36c51e5b78de5622f3f8fc
-
SHA256
dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b
-
SHA512
7e2fa195d328c62351bca4b13bc7fcade72b57693fea499d21d4829eb184e1d6febe269eea3c3aa64259095abbf33371177ac9be3ce5229985cba57be2c472dd
-
SSDEEP
3072:CaDpZ+xJi1hHw7U3zNwP6uRw8LL260748sgCCn/vSPWn3CwE56JdoSh7+AgeHXoj:CSvhHw7cfrTPNCwEYJdlQAgR1N
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-