Analysis
-
max time kernel
139s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 11:36
Behavioral task
behavioral1
Sample
a3ae89db4042770f2baf48e07b7c5a10.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a3ae89db4042770f2baf48e07b7c5a10.exe
Resource
win10v2004-20240221-en
General
-
Target
a3ae89db4042770f2baf48e07b7c5a10.exe
-
Size
8KB
-
MD5
a3ae89db4042770f2baf48e07b7c5a10
-
SHA1
3968dd570f890093aa4095b4861d4317c7f09929
-
SHA256
e26a67e0f53896ff00c4da0355e182d6defd6da258dbad5bf2951bf0d7874153
-
SHA512
7a1998d4f2dd36a716bc93cc61d2627ff69041a4c66cb24bd6d5500efaf58fb231ddc95b3f6bdbca3424e18ed4cf0d18ea6c0cc3025de41448018d0e87a2a960
-
SSDEEP
192:QZEkmljQh2bLYWDndn9MXAbUTik9Hbvqqs:MojQh2lBn9uOkVqf
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/download_exec
http://string.dyndns.org:443/INITM
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.