Analysis
-
max time kernel
134s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2022 12:26
Behavioral task
behavioral1
Sample
429dbbe9b229cf56554826cb142f3addcf848f6e701984c7020b1da05df1b527.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
429dbbe9b229cf56554826cb142f3addcf848f6e701984c7020b1da05df1b527.exe
Resource
win10v2004-20220812-en
General
-
Target
429dbbe9b229cf56554826cb142f3addcf848f6e701984c7020b1da05df1b527.exe
-
Size
60KB
-
MD5
faa390d3e31c24d2faa9dd9b39e14ad5
-
SHA1
49d092488b9ef39f603c3446714f32bf6e0c80e7
-
SHA256
429dbbe9b229cf56554826cb142f3addcf848f6e701984c7020b1da05df1b527
-
SHA512
1508a1ef58fb088958bf92575e55007cb80f4983a79d5cec72cb31ae132c30759f804bac9c9751d87cd081ef9d9a4e1c4113f8c8b1df226757e847117e6201f5
Malware Config
Extracted
metasploit
windows/reverse_tcp
127.0.0.1:4444
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.