Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 09:50
Behavioral task
behavioral1
Sample
1538ed98f07b633e5e4bc50e7c0df879.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1538ed98f07b633e5e4bc50e7c0df879.exe
Resource
win10v2004-20231215-en
General
-
Target
1538ed98f07b633e5e4bc50e7c0df879.exe
-
Size
11KB
-
MD5
1538ed98f07b633e5e4bc50e7c0df879
-
SHA1
1812a1b93a6baf8ea731ba02c4a2ee925fb380e8
-
SHA256
3fcac180bbfaa51142f1dfa9ac2e6a9b71a6b111673eed362c35f1333b5ce783
-
SHA512
75c671d73495570cdcc0ff531289c8d1d5b61e728fc7d1b6d6933bacc5af47187d30405f60f031ba7ccd860937f8414e609825253e58e5f26894968579428493
-
SSDEEP
192:CxiAMAN0SGay9IQ6t93k55m4FFFQz6F90TZs1CM0n:sm5ay9IF3CQLswF
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
192.168.1.100:8888
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.