Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2024 19:02
Behavioral task
behavioral1
Sample
039aebb1a469963963e34d31a42e6608.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
039aebb1a469963963e34d31a42e6608.exe
Resource
win10v2004-20231215-en
General
-
Target
039aebb1a469963963e34d31a42e6608.exe
-
Size
72KB
-
MD5
039aebb1a469963963e34d31a42e6608
-
SHA1
6a60e11aa5949ab9fd861397879e2b6649292e2b
-
SHA256
5cad07e8a93e151126f2668e4acd40bfb6a6c136720868e1abb88d6ce855488b
-
SHA512
37ce7dff742d3a9680574c96012c81fcbb3aa94435c7aeb4691f1a6fa9e9e8009e63b4d3d126302fbeab13adf453b045fd5c2dcfd4ca7d24b20f90e4e4e386a0
-
SSDEEP
1536:Ia6vKe2IO6a0lRL82nTnWVMb+KR0Nc8QsJq39:W1xL5ue0Nc8QsC9
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.