Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 11:00
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231215-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
72KB
-
MD5
19641940c87adf2e125b5b85f8d242a7
-
SHA1
dd76a18cc6826b3a4a64eedca2dc9026714a3d9e
-
SHA256
6eadbbb4368eb760df9ccec6ea44a3d6b63c05f224738dc0e7c06db528ba85f8
-
SHA512
e498e110e84db19e0277401d833080931439c1f846bbb8297c93c0bbb25f6f74146994af67a96a4abcdd42d9a62145c8ebff9b7ddf9a9bb3d1ab156a6a9600c3
-
SSDEEP
1536:IGhs3e+IHJESRaZa4ctAm2r+Mb+KR0Nc8QsJq39:zhs3XR3stAJ+e0Nc8QsC9
Score
10/10
Malware Config
Extracted
Family
metasploit
Version
windows/reverse_tcp
C2
193.117.208.148:7800
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.