Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    16/01/2024, 04:15

General

  • Target

    5ef044b3315bae50dce8f8eb83a63d5a.exe

  • Size

    1.3MB

  • MD5

    5ef044b3315bae50dce8f8eb83a63d5a

  • SHA1

    c005141856590631c737dbf69b5061ac58afb49f

  • SHA256

    558e5b83232a29f3e5d166b7504b7416f2aafb96b957fad1e92da7761ac25311

  • SHA512

    cb841419871b2fb51102231f78478c79bfc02d6854fbf12442698f81ed0b374ce13a12629d8b9ef863b975a14e502dc820ecf5a2f7f6acd4b808b0c75990b308

  • SSDEEP

    24576:zJlA9bLCUIgalDsFAElhceatNtpKau9nj3AI6UVbDJ7uHATW7I:zJl+bzW5Elhce65Kasnf6QKeW7I

Malware Config

Extracted

Family

metasploit

Version

windows/download_exec

C2

http://121.43.116.252:443/TqAV

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ef044b3315bae50dce8f8eb83a63d5a.exe
    "C:\Users\Admin\AppData\Local\Temp\5ef044b3315bae50dce8f8eb83a63d5a.exe"
    1⤵
      PID:1488

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1488-1-0x0000000012000000-0x0000000013000000-memory.dmp

            Filesize

            16.0MB

          • memory/1488-2-0x0000000012000000-0x0000000013000000-memory.dmp

            Filesize

            16.0MB