Analysis
-
max time kernel
159s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-06-2022 01:36
Static task
static1
Behavioral task
behavioral1
Sample
auLEyIAfQPEvE.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
auLEyIAfQPEvE.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
auLEyIAfQPEvE.exe
-
Size
4KB
-
MD5
18c60c61400f5bc112cfdd51687769eb
-
SHA1
63ce022bb0e9de8ab6e6add515e48a5ea8f565f3
-
SHA256
4dd60ae0c66143e9553b9145abdaa9232184bb0fc1c3da65a15b67e196b86406
-
SHA512
15ba2795233b2d7f666054a652c4ce018b242a1af259f61a11be1bd721ab5014962d41306aa06c807f364969d85d8009516e8ccd883b33def376b8b10ad44591
Score
10/10
Malware Config
Extracted
Family
metasploit
Version
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2492-130-0x0000000000400000-0x0000000000404000-memory.dmpFilesize
16KB