Analysis

  • max time kernel
    211s
  • max time network
    200s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    02-05-2024 05:30

General

  • Target

    kjkabuto.exe

  • Size

    10KB

  • MD5

    cb4b301818988817424fe52d70ed1a31

  • SHA1

    44759121d7eb322bf79c1f84bd9ad16abb14e9de

  • SHA256

    31192ca71342d0e5d073a56257e730035804d18e14adac303e8537a0778ce46c

  • SHA512

    b45ba16a0ee1f05f886e4b6a9073d5a6dd376f95fddc801984b5d5c63709d7cd7d73f7cbabfe01235b1aaee8978a250f73d38aeaff59c59c2f76dec71ad56308

  • SSDEEP

    24:eFGStrJ9u0/6fG/woYG1k+mYKZqYeNDMSCvOXpmB:is0z/wa++jKSD9C2kB

Malware Config

Extracted

Family

metasploit

Version

metasploit_stager

C2

18.207.253.212:4443

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

Processes

  • C:\Users\Admin\AppData\Local\Temp\kjkabuto.exe
    "C:\Users\Admin\AppData\Local\Temp\kjkabuto.exe"
    1⤵
      PID:2180

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2180-0-0x0000000140000000-0x0000000140004278-memory.dmp
      Filesize

      16KB