Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/04/2024, 01:18

General

  • Target

    5776118e9c564e6f9309c5f3a6dd810f5d7e8a11af2d7709f879b9314afcf3fc.exe

  • Size

    72KB

  • MD5

    a79a312d0fded031110f4c1ca20466e2

  • SHA1

    2b1f37fd3d992bf03121ce46a167b21026236e34

  • SHA256

    5776118e9c564e6f9309c5f3a6dd810f5d7e8a11af2d7709f879b9314afcf3fc

  • SHA512

    4761947e47a1d376dcc4ea3a79967f1223e1f557802307c2b4e8bc81ed86288af3e6395254ca864eb4ec3ed76f4a0d27457ed40a9c1e81e716ccf637b6038677

  • SSDEEP

    1536:IcpwRGgQdp1C34YwxVbFW9z6A8JEgaOOs2Mb+KR0Nc8QsJq39:9wmp1CLQVbcslnaO2e0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

3.85.82.203:8443

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5776118e9c564e6f9309c5f3a6dd810f5d7e8a11af2d7709f879b9314afcf3fc.exe
    "C:\Users\Admin\AppData\Local\Temp\5776118e9c564e6f9309c5f3a6dd810f5d7e8a11af2d7709f879b9314afcf3fc.exe"
    1⤵
      PID:2808

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2808-0-0x0000000000020000-0x0000000000021000-memory.dmp

            Filesize

            4KB