Analysis
-
max time kernel
208s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
10-05-2022 23:16
Static task
static1
Behavioral task
behavioral1
Sample
c1f861c34de9599e614601f1c922d303bb44a0783383cc3f2faaade016a46591.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
c1f861c34de9599e614601f1c922d303bb44a0783383cc3f2faaade016a46591.exe
Resource
win10v2004-20220414-en
General
-
Target
c1f861c34de9599e614601f1c922d303bb44a0783383cc3f2faaade016a46591.exe
-
Size
23KB
-
MD5
73af23f556158d04894f9491f0003250
-
SHA1
163419305f4f45f1fc1a9985f3ad284d67250543
-
SHA256
c1f861c34de9599e614601f1c922d303bb44a0783383cc3f2faaade016a46591
-
SHA512
5a4fc5ba3109c6e340291e4e060a58a12b839ce8607c85b11e14ae1872c76b7f6886e1446d9a7b8f52d491067426e7367e5e504cb659395048cd71fd6aacae2d
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
192.168.199.133:3333
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.