Analysis
-
max time kernel
51s -
max time network
59s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
21/05/2023, 21:08
Behavioral task
behavioral1
Sample
304a28d5e9010331c8f183b5932d0420410cf5e749f84cdd02d9992abd397285.pdf
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
form.exe
Resource
win10-20230220-en
General
-
Target
form.exe
-
Size
72KB
-
MD5
5f00d238716e3f337786f4355b2b9787
-
SHA1
13e6c20b4814e78cf8c62b425ba9441549b6a77f
-
SHA256
32418b564d5e2b353a8318de475b13ef58d3a6400d33a4d9ecdf93f29166f234
-
SHA512
a3d6eb6d35b424df9c953c053d5a791cdcf39539de7f80678b898f1b27acbdf34c0ad16c07e24409db07fe29c2b98e0928c036ead2dbfe77d7581e5b6cd3f532
-
SSDEEP
1536:Ix3MvR7pgILAIxNsdoLut/jaIFLxBMb+KR0Nc8QsJq39:kCvAxdoCtGgje0Nc8QsC9
Malware Config
Extracted
metasploit
windows/reverse_tcp
172.104.56.177:1337
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.