Analysis

  • max time kernel
    137s
  • max time network
    170s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    29-05-2022 16:42

General

  • Target

    0da9083abfe8ada71bc9f2b3ff4eef1d3209bf18bbe0431089a5674b7e75dd4a.exe

  • Size

    7KB

  • MD5

    4f14ba122857e303b0c0e428afe7bf59

  • SHA1

    5ce626e6ef0732db03aed2cd056029b3531d8a75

  • SHA256

    0da9083abfe8ada71bc9f2b3ff4eef1d3209bf18bbe0431089a5674b7e75dd4a

  • SHA512

    5fe3ace141dd29ca922680643f2d179f52b600432f123dc99ce6facf8b8b57d39a5199b5e8ec1085ed10cb01b07af66bd4611d170682ce748f9c9a4e1f5022ea

Malware Config

Extracted

Family

metasploit

Version

metasploit_stager

C2

172.104.107.30:4444

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0da9083abfe8ada71bc9f2b3ff4eef1d3209bf18bbe0431089a5674b7e75dd4a.exe
    "C:\Users\Admin\AppData\Local\Temp\0da9083abfe8ada71bc9f2b3ff4eef1d3209bf18bbe0431089a5674b7e75dd4a.exe"
    1⤵
      PID:1156

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1156-54-0x0000000140000000-0x0000000140004458-memory.dmp
      Filesize

      17KB