Analysis
-
max time kernel
154s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
29-05-2022 16:42
Static task
static1
Behavioral task
behavioral1
Sample
0da9083abfe8ada71bc9f2b3ff4eef1d3209bf18bbe0431089a5674b7e75dd4a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0da9083abfe8ada71bc9f2b3ff4eef1d3209bf18bbe0431089a5674b7e75dd4a.exe
Resource
win10v2004-20220414-en
General
-
Target
0da9083abfe8ada71bc9f2b3ff4eef1d3209bf18bbe0431089a5674b7e75dd4a.exe
-
Size
7KB
-
MD5
4f14ba122857e303b0c0e428afe7bf59
-
SHA1
5ce626e6ef0732db03aed2cd056029b3531d8a75
-
SHA256
0da9083abfe8ada71bc9f2b3ff4eef1d3209bf18bbe0431089a5674b7e75dd4a
-
SHA512
5fe3ace141dd29ca922680643f2d179f52b600432f123dc99ce6facf8b8b57d39a5199b5e8ec1085ed10cb01b07af66bd4611d170682ce748f9c9a4e1f5022ea
Malware Config
Extracted
metasploit
metasploit_stager
172.104.107.30:4444
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3308-130-0x0000000140000000-0x0000000140004458-memory.dmpFilesize
17KB