Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-05-2024 11:41

General

  • Target

    kiki.exe

  • Size

    72KB

  • MD5

    a99f3b501d87f7e5ff90b97f1f4a820f

  • SHA1

    5db5c4aac55db25894eae9f3ddba7a2a582459b3

  • SHA256

    a30e13548b7ec9c749cc9ce33351f0b701b4f922f303bd6679958ed791a7b927

  • SHA512

    b1f0a17126ba765aa417edf031a5f7f1e1958ab133a8e47a9e2039245578e1d44c9c4a2ea1b119802dd99007233fb49bb3cf2367a0a825850dc9050c7bc2e1cc

  • SSDEEP

    1536:IRduIzhHnT8LedCMWnbh56FtVMb+KR0Nc8QsJq39:U4+HnTbdC1DCPe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

10.10.79.149:9666

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

Processes

  • C:\Users\Admin\AppData\Local\Temp\kiki.exe
    "C:\Users\Admin\AppData\Local\Temp\kiki.exe"
    1⤵
      PID:4360

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4360-0-0x0000000000590000-0x0000000000591000-memory.dmp

      Filesize

      4KB