Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-06-2022 10:37
Static task
static1
Behavioral task
behavioral1
Sample
eb6fbdb9adce50a5_Detector.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
eb6fbdb9adce50a5_Detector.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
eb6fbdb9adce50a5_Detector.exe
-
Size
40KB
-
MD5
2adc0c083547430265c3f2151e5670e6
-
SHA1
b2d3cd46878ef8b93aa5ed55ab53b990b2ebe89d
-
SHA256
eb6fbdb9adce50a56e2adb5d52304fb16059955a110b1f43a39176dcb6611b29
-
SHA512
8c9a7af8b8c171ac414c3cec1cad933f441a091e0fa798d84d240afae75a7f2d60eb328f7364e7fb67dc2c22377fa6b5248f7f1b33660ed1b71a590e3a211ee3
Score
10/10
Malware Config
Extracted
Family
metasploit
Version
encoder/call4_dword_xor
Extracted
Family
metasploit
Version
windows/exec
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2036-54-0x0000000000D70000-0x0000000000D90000-memory.dmpFilesize
128KB