Analysis
-
max time kernel
200s -
max time network
224s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 09:45
Behavioral task
behavioral1
Sample
150896e8cd3dc9e8446aac138c57573b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
150896e8cd3dc9e8446aac138c57573b.exe
Resource
win10v2004-20231215-en
General
-
Target
150896e8cd3dc9e8446aac138c57573b.exe
-
Size
381KB
-
MD5
150896e8cd3dc9e8446aac138c57573b
-
SHA1
9f71930b323bbcd6488f9276d9d5d678d582e094
-
SHA256
f94c7394d0e2554f5515ce64624c291177677d2c52ad4031665f4557796c1968
-
SHA512
30808271cd80ac739c70d3916082cbb5aade42b887dbde3970911e183a0c7325b8b813d022008ff730ad6e674db1691010a9eff3194e244e981e0697db22af74
-
SSDEEP
6144:09JHW/xyqktKWQ6zdLlaaM/OO5ji/JZQ+6K22s3tm+6xSFgOQkfqf9bp:yJHW/2oKKaMWOdi/U+69c+6xIg9kC9bp
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
192.168.10.30:30700
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.