Behavioral task
behavioral1
Sample
eaf6bec10dafecc0c999b39058d97d716403acf7ee9fd914740807554f8cafde.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eaf6bec10dafecc0c999b39058d97d716403acf7ee9fd914740807554f8cafde.exe
Resource
win10v2004-20220812-en
General
-
Target
eaf6bec10dafecc0c999b39058d97d716403acf7ee9fd914740807554f8cafde.exe
-
Size
7KB
-
MD5
e68ab7d608529a03610870bd0cc6f757
-
SHA1
bbb5fd9d443a26c2dd729f65b02505573a80a1a3
-
SHA256
eaf6bec10dafecc0c999b39058d97d716403acf7ee9fd914740807554f8cafde
-
SHA512
0dcc9dafb21a51647a03b71bdb5de611efef9d64ea6267b4df45ecb73a81ecc4f6b453ed75e6cd9061a83518f948e01ce0f6e79a1836432564d4cfbf97d8b595
-
SSDEEP
24:eFGStrJ9u0/63BXnZdkBQAVv1c+nKPqIAeNDMSCvOXpmB:is0wBzkBQY++nQASD9C2kB
Malware Config
Extracted
metasploit
metasploit_stager
192.168.93.164:4758
Signatures
-
Metasploit family
Files
-
eaf6bec10dafecc0c999b39058d97d716403acf7ee9fd914740807554f8cafde.exe.exe windows x64
b4c6fff030479aa3b12625be67bf4914
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
VirtualAlloc
ExitProcess
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 132B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.duwb Size: 1024B - Virtual size: 632B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE