Behavioral task
behavioral1
Sample
1231a6929dac3422552988f63b7d219006e41fb73457433ed8f734544c2032b4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1231a6929dac3422552988f63b7d219006e41fb73457433ed8f734544c2032b4.exe
Resource
win10v2004-20220812-en
General
-
Target
1231a6929dac3422552988f63b7d219006e41fb73457433ed8f734544c2032b4
-
Size
6KB
-
MD5
69ef8e72758610d46c68a5dcff49c6e0
-
SHA1
7134d233bfffb7edae0018a67baaa8bfc987f9e1
-
SHA256
1231a6929dac3422552988f63b7d219006e41fb73457433ed8f734544c2032b4
-
SHA512
e8a4c2c9753c7350a4726075f5b6b079810755d44623b7e1a722fa2f414ee8b00fee4610e1891098a019d26e89cba4d9bee79b6c9bfd20d25d16b70360c4ada4
-
SSDEEP
24:eFGStrJ9u084WgxnZUaKq9K9qdeNDJSPgigGBQAV:is0DYE9nSDoPvgGBQ
Malware Config
Extracted
metasploit
metasploit_stager
199.119.225.112:1024
Signatures
-
Metasploit family
Files
-
1231a6929dac3422552988f63b7d219006e41fb73457433ed8f734544c2032b4.exe windows x64
b4c6fff030479aa3b12625be67bf4914
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
VirtualAlloc
ExitProcess
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 132B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ