Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
30-05-2022 22:08
Static task
static1
Behavioral task
behavioral1
Sample
085e151435429cdc783dd17f817a629f7e28e2ce622e643f936634b4bcd7f277.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
085e151435429cdc783dd17f817a629f7e28e2ce622e643f936634b4bcd7f277.exe
Resource
win10v2004-20220414-en
General
-
Target
085e151435429cdc783dd17f817a629f7e28e2ce622e643f936634b4bcd7f277.exe
-
Size
7KB
-
MD5
2fa473342edf07432f8d3552322956e3
-
SHA1
e934011905dad6cdc4ad48c5e003775555a27b28
-
SHA256
085e151435429cdc783dd17f817a629f7e28e2ce622e643f936634b4bcd7f277
-
SHA512
e8396eadcf84991c3a386f7cf2e1baa037d0c2468fe7182ee6b70f4b76002c4bd8f659d82a9eaf538e22b242038d023e4e044423b6c7cf07ff40e49776d3fd2c
Malware Config
Extracted
metasploit
metasploit_stager
200.171.231.146:3537
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/5040-130-0x0000000140000000-0x0000000140004278-memory.dmpFilesize
16KB