Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
19-04-2024 09:17
Behavioral task
behavioral1
Sample
7zd.exe
Resource
win10-20240404-en
1 signatures
150 seconds
General
-
Target
7zd.exe
-
Size
72KB
-
MD5
71cd1dc1018afeb751c745566665967b
-
SHA1
2ef8373b089990691c50b3d8cb976c6b33c72376
-
SHA256
f433151fabdf7257350c4ee09ce803c9b6efe973477c83f8f9bf69287e544b96
-
SHA512
0f7ae3f8699102f18f79181edb6ec2ea620776a2978d4b23be35568b63e5fa298ffdbb593b0fa49f642cd4c8bae48ff414d6908fdca2f35be06c4f6ec6ce8c21
-
SSDEEP
1536:IrlUt6DTm8Fp6oE8N1QccMb+KR0Nc8QsJq39:3+TmDT8fQcce0Nc8QsC9
Score
10/10
Malware Config
Extracted
Family
metasploit
Version
windows/reverse_tcp
C2
192.168.31.11:4444
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.