Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/01/2024, 02:02
Behavioral task
behavioral1
Sample
59fce5be04d9bc67e440faa185f8ad75.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
59fce5be04d9bc67e440faa185f8ad75.exe
Resource
win10v2004-20231215-en
General
-
Target
59fce5be04d9bc67e440faa185f8ad75.exe
-
Size
9KB
-
MD5
59fce5be04d9bc67e440faa185f8ad75
-
SHA1
3a348ad5c9ea38af0bb01ee845a8521d4363bf81
-
SHA256
3cc03428f296e942432be8bac2a6ba4433fe1b008234d75c94fdd246b3849026
-
SHA512
1967571acd71c66eef879eef799d19b51b1b406c618ba5d56b10f195c456777bd4ab58d752e4e591693e6bb62af624c7cff465fa6fbb111e426ba11f876b51a4
-
SSDEEP
192:PnhcOQD7j34gjjOKry7E5pz6rJoZgGcJoO:PeDf4Kjfy7mOGt
Malware Config
Extracted
metasploit
windows/reverse_tcp
192.168.10.61:3333
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.