Analysis
-
max time kernel
165s -
max time network
220s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
31-05-2022 05:20
Static task
static1
Behavioral task
behavioral1
Sample
06a763aed3ec6e856dbee8aec6d67432483e8e3ec3e895cfbc9cb85a911b275c.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
06a763aed3ec6e856dbee8aec6d67432483e8e3ec3e895cfbc9cb85a911b275c.exe
Resource
win10v2004-20220414-en
General
-
Target
06a763aed3ec6e856dbee8aec6d67432483e8e3ec3e895cfbc9cb85a911b275c.exe
-
Size
7KB
-
MD5
8e9320109c8d7380dcd003a1bf78edae
-
SHA1
a343cdac9e40542abf012be78dfa9d87b3e698ae
-
SHA256
06a763aed3ec6e856dbee8aec6d67432483e8e3ec3e895cfbc9cb85a911b275c
-
SHA512
fe7b09f6a13d6f607df7f165320bf85c4274a7625de6f8949c370386f52c306f85df38952e7427f2694bd29b5fc33158446072bf689f0225c268447f34d489ca
Malware Config
Extracted
metasploit
metasploit_stager
47.90.124.89:1234
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/756-54-0x0000000140000000-0x0000000140004278-memory.dmpFilesize
16KB