MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d0e6c07c094c482eed3ebe6441a1348db9668ef4f596e563ad2f1637bb5ed5fb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Metasploit


Vendor detections: 13


Intelligence 13 IOCs YARA 2 File information Comments

SHA256 hash: d0e6c07c094c482eed3ebe6441a1348db9668ef4f596e563ad2f1637bb5ed5fb
SHA3-384 hash: 5a8a61d579b1c9a41c101f07db8a60a817c4ab3313e6c5a5a28478f834ab3bf1ce99a2f186f01bcbcb713fb1a5311462
SHA1 hash: a7a48e8ede994b59b94721220b1bf8396881eab6
MD5 hash: f4194346ba76a8ad7f2b3ba380f93925
humanhash: oven-friend-equal-item
File name:TeamServ.exe
Download: download sample
Signature Metasploit
File size:18'432 bytes
First seen:2026-03-02 22:52:16 UTC
Last seen:2026-03-03 09:39:51 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash ba782605aac629a26bc1fecb2cf3b2a0 (4 x Metasploit, 1 x Meterpreter)
ssdeep 192:oFuOW7Lam/qxNvZzgUuzjm+xatsJlNf6gr2PxsMKup7xofn6xn3dzG6Gc+HFcI/Y:oceV4P6gr2u2x2n6n3c6GnWI/c+To
TLSH T15C8228897B06D8CDC5B68179C4322D6AA129F36413724BEF67B0482A0D67FB07D2DF94
TrID 33.1% (.EXE) Win64 Executable (generic) (6522/11/2)
25.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
10.4% (.ICL) Windows Icons Library (generic) (2059/9)
10.3% (.EXE) OS/2 Executable (generic) (2029/13)
10.1% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter 1ZRR4H
Tags:141.11.107.134 exe Metasploit

Intelligence


File Origin
# of uploads :
3
# of downloads :
152
Origin country :
CL CL
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
TeamServ.exe
Verdict:
Malicious activity
Analysis date:
2026-03-02 22:54:16 UTC
Tags:
backdoor metasploit shellcode

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
shellcode virus
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Connection attempt
Sending a custom TCP request
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm microsoft_visual_cc mikey
Verdict:
Malicious
File Type:
exe x64
Detections:
PDM:Trojan.Win32.Generic Trojan.Win64.Shelm.sb Trojan.Win32.Shelm.c HEUR:Trojan.Win32.Generic
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Win 64 Exe x64
Threat name:
Win64.Backdoor.Meterpreter
Status:
Malicious
First seen:
2026-02-20 19:02:36 UTC
File Type:
PE+ (Exe)
Extracted files:
1
AV detection:
19 of 36 (52.78%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
metasploit
Similar samples:
Result
Malware family:
metasploit
Score:
  10/10
Tags:
family:metasploit backdoor trojan
Behaviour
Suspicious use of WriteProcessMemory
MetaSploit
Metasploit family
Malware Config
C2 Extraction:
141.11.107.134:4040
Unpacked files
SH256 hash:
d0e6c07c094c482eed3ebe6441a1348db9668ef4f596e563ad2f1637bb5ed5fb
MD5 hash:
f4194346ba76a8ad7f2b3ba380f93925
SHA1 hash:
a7a48e8ede994b59b94721220b1bf8396881eab6
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Metasploit

Executable exe d0e6c07c094c482eed3ebe6441a1348db9668ef4f596e563ad2f1637bb5ed5fb

(this sample)

  
Delivery method
Distributed via web download

Comments