Analysis
-
max time kernel
134s -
max time network
138s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
19-05-2024 01:07
Behavioral task
behavioral1
Sample
huj.exe
Resource
win10-20240404-en
windows10-1703-x64
1 signatures
150 seconds
General
-
Target
huj.exe
-
Size
6KB
-
MD5
c92b545a8473d4851312a658afe2fa64
-
SHA1
c5f3ee25cfb067f94952b53060baa6e4a8530814
-
SHA256
7c1fe1fd90d6f25fe822af87c1a9a21cd6e44c9e70213e4c8abc68c5189542ae
-
SHA512
cdb7311fe09d1470d6136bbdeeed91c8b978e883da5aafb5289a7e3246a376eb38aa55d5b17a22896258ffda77c46d91d68d964e56350b0c59356d6aa405edc7
-
SSDEEP
96:wzRQNvQefVLWS7b3uIUY1deReidtFGzNt:wUYef5WS7FwResA
Score
10/10
Malware Config
Extracted
Family
metasploit
Version
encoder/shikata_ga_nai
Extracted
Family
metasploit
Version
windows/exec
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.