Behavioral task
behavioral1
Sample
1908-67-0x0000000140000000-0x0000000140005000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1908-67-0x0000000140000000-0x0000000140005000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1908-67-0x0000000140000000-0x0000000140005000-memory.dmp
-
Size
20KB
-
MD5
689eb754b326b319491073635d807450
-
SHA1
116e2b4feb27238ab0b4a6d7b4e849b7f05163d4
-
SHA256
f4f6c18249b65e40b75889fe318a65eb9bac8083cc86633c638c16ae28c38624
-
SHA512
cbc3880827d4a8fe3e1e80c5bd936a1ba782f3ea4f6cf3cf149f87c9bb29ba9ee5f8d0f912c92af9e7799be4700e9c56f16ee73791433abc6c3eafae1168c116
-
SSDEEP
24:eFGStrJ9u0/624nZdOBQAV3Ox+AwKZqIeNDMSCvOppmB:is0HMOBQ7x+AwGSD9C2OB
Malware Config
Extracted
metasploit
metasploit_stager
45.148.121.63:44944
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1908-67-0x0000000140000000-0x0000000140005000-memory.dmp
Files
-
1908-67-0x0000000140000000-0x0000000140005000-memory.dmp.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 132B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fcth Size: 1024B - Virtual size: 672B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE