Analysis

  • max time kernel
    154s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    05-05-2021 01:11

General

  • Target

    cec2b481446063e8805c6ff2339f8f950664b5b03e555a7148d95afc644ec3f9.exe

  • Size

    72KB

  • MD5

    7d53a03479d496e4fe8428317732d2f1

  • SHA1

    76a87d0892f2a34a2b75d68e8771af5946d2eb8a

  • SHA256

    cec2b481446063e8805c6ff2339f8f950664b5b03e555a7148d95afc644ec3f9

  • SHA512

    37c85da1c90e883ecf64778ebd814b8e4298f8a20e702a7340310e6c45c1c04da241ac8f930aa61bfd5217d14dfb179e0675606bdb9762ecd02af9e3eb0cc228

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.100.250:443

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cec2b481446063e8805c6ff2339f8f950664b5b03e555a7148d95afc644ec3f9.exe
    "C:\Users\Admin\AppData\Local\Temp\cec2b481446063e8805c6ff2339f8f950664b5b03e555a7148d95afc644ec3f9.exe"
    1⤵
      PID:1920

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1920-60-0x0000000000020000-0x0000000000021000-memory.dmp
      Filesize

      4KB