Analysis
-
max time kernel
153s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-09-2022 03:01
Static task
static1
Behavioral task
behavioral1
Sample
1b780b4355cccc3c0f850bba1486db1b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1b780b4355cccc3c0f850bba1486db1b.exe
Resource
win10v2004-20220812-en
General
-
Target
1b780b4355cccc3c0f850bba1486db1b.exe
-
Size
195KB
-
MD5
1b780b4355cccc3c0f850bba1486db1b
-
SHA1
65305aeacf482d9495b68eec61c1ef64e9b0446c
-
SHA256
757ecb1a43db6d18e1c1797157cdb5253baeb32d8c94adae7b20bd5266ec1f9b
-
SHA512
d440e834312704b65409f4f551d34f523009ad0a1371c3687c9f8e41a5aa30212a08a931161a6a1a2818ee3ed33f68c4fe0e272c232366f333f7dabd8c450654
-
SSDEEP
3072:dryEFdApaWVzPCWdEcCb6Xc8F9u7CC/CaFwT8FJ2AB2O9D5pZa9uD6Vdyhk7:FRFdAUEzPib4tF9EDCam2BXnwVf7
Malware Config
Extracted
metasploit
windows/reverse_tcp
188.119.112.85:443
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.