Analysis
-
max time kernel
138s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-06-2022 06:02
Static task
static1
Behavioral task
behavioral1
Sample
223468118b1774dadf7914a6fb733a36ba16054d81e965af2ebd2b48b13cba40.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
223468118b1774dadf7914a6fb733a36ba16054d81e965af2ebd2b48b13cba40.exe
Resource
win10v2004-20220414-en
General
-
Target
223468118b1774dadf7914a6fb733a36ba16054d81e965af2ebd2b48b13cba40.exe
-
Size
24KB
-
MD5
4cd79d4f838bb67a2ede89c9181cafaf
-
SHA1
72a3acdbea12be35cd610ac70dfa74d6580d3be7
-
SHA256
223468118b1774dadf7914a6fb733a36ba16054d81e965af2ebd2b48b13cba40
-
SHA512
86bc7cce4bdf58a687620a57bfe2d2eef8b2557668072ecb6b56fa06e3640063ce476754fa1f5c3ef6016e2b8ec54f8867548073b5ea7b9a4999762847f81447
Malware Config
Extracted
metasploit
windows/download_exec
http://128.121.17.148:443/EeFl
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3856-130-0x0000000001210000-0x0000000001331000-memory.dmpFilesize
1.1MB