Resubmissions

08-06-2022 01:12

220608-bkmtsshdg4 10

Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    08-06-2022 01:12

General

  • Target

    krwNsWDZJ.exe

  • Size

    4KB

  • MD5

    1f22e11d0f91d1e2e32ef5d5b8951767

  • SHA1

    2af16c31f88ec756bba2d6777730842f1b7d518c

  • SHA256

    2cd455a348b55ca3809ce16bad516a37f798370e9cd264303e327ef147b6c613

  • SHA512

    d7fb6079fe1f02baf46bbfb812d2c3144b32cd43ea36485184ea85d085fc425ca59301e7321a1c1f8da0df8392e5317ff526726d262d2ae62ab9326ae9d1c636

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

10.97.56.220:4444

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

Processes

  • C:\Users\Admin\AppData\Local\Temp\krwNsWDZJ.exe
    "C:\Users\Admin\AppData\Local\Temp\krwNsWDZJ.exe"
    1⤵
      PID:1156

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1156-130-0x0000000000400000-0x0000000000404000-memory.dmp
      Filesize

      16KB