Behavioral task
behavioral1
Sample
Device/HarddiskVolume2/Windows/Temp/cfgbuwcN.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Device/HarddiskVolume2/Windows/Temp/cfgbuwcN.exe
Resource
win10v2004-20220812-en
General
-
Target
machpanel1_2023-01-13_09_13_05 (1).zip
-
Size
1KB
-
MD5
c8f56376813677a1ae313e9a7387d698
-
SHA1
b54c9d2234eb4fcd77ced1f6ed03a832f72c4e39
-
SHA256
9ac97b857e2d269365c4c5eb3e744fa576983734cea2bdc93d8aa126381e3e41
-
SHA512
be9376131e7c33b8ed77dab167f844e969077f663a5f422805059b32770a7560c1ac0009c3993162b2ceb69471b31bc764d6509c1cbf1d2a32460438289741a7
Malware Config
Extracted
metasploit
metasploit_stager
185.99.135.115:49241
Signatures
-
Metasploit family
Files
-
machpanel1_2023-01-13_09_13_05 (1).zip.zip
Password: Malware123!!
-
Device/HarddiskVolume2/Windows/Temp/cfgbuwcN.exe.exe windows x64
Password: Malware123!!
b4c6fff030479aa3b12625be67bf4914
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
VirtualAlloc
ExitProcess
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 132B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ovtl Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
manifest.json