Analysis
-
max time kernel
135s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
04-06-2022 16:07
Static task
static1
Behavioral task
behavioral1
Sample
0f49e2c3ecf711a00699be0c123d34eb3dcdead5d0dc8ebe80af66b200649729.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0f49e2c3ecf711a00699be0c123d34eb3dcdead5d0dc8ebe80af66b200649729.exe
Resource
win10v2004-20220414-en
General
-
Target
0f49e2c3ecf711a00699be0c123d34eb3dcdead5d0dc8ebe80af66b200649729.exe
-
Size
7KB
-
MD5
22353e561f4a153b5e6bc7265081964c
-
SHA1
0f92b6262112e7dd13b4cc05d3826ae9df6274c9
-
SHA256
0f49e2c3ecf711a00699be0c123d34eb3dcdead5d0dc8ebe80af66b200649729
-
SHA512
784e98e17fcd0878fe8bc3e18440cb7be4d8c89f6e2bc9e935f101897103747da565cb2c39c29e446bd51369d0650d0689a2919603f36853422ac8418b829238
Malware Config
Extracted
metasploit
metasploit_stager
187.74.75.191:3537
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/868-54-0x0000000140000000-0x0000000140004278-memory.dmpFilesize
16KB