Analysis

  • max time kernel
    90s
  • max time network
    95s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    29-05-2024 08:40

General

  • Target

    8dbbb521ce069043bea5200f322c58af6fe204c2cf121a9d9437a010360fd757.exe

  • Size

    7KB

  • MD5

    a63b46b7836c6c260dc4b37d7c640d3f

  • SHA1

    b3e2067097603ad03b6e4085ab24b87eefe1f2c8

  • SHA256

    8dbbb521ce069043bea5200f322c58af6fe204c2cf121a9d9437a010360fd757

  • SHA512

    e42f4bd865bc1861713f35fda3d3165cb50efd918d4fea0bf9fe52db777db002a555ea67664705e47a9e1c11f9d10d7270fa4ff65f12f41f93cbe6e8ba551c6b

  • SSDEEP

    24:eFGStrJ9u0/6Z1nxnZdkBQAVv1c+JKZqdeNDMSCvOXpmB:is0IbkBQY++JXSD9C2kB

Malware Config

Extracted

Family

metasploit

Version

metasploit_stager

C2

94.139.242.7:5454

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8dbbb521ce069043bea5200f322c58af6fe204c2cf121a9d9437a010360fd757.exe
    "C:\Users\Admin\AppData\Local\Temp\8dbbb521ce069043bea5200f322c58af6fe204c2cf121a9d9437a010360fd757.exe"
    1⤵
      PID:3272

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3272-0-0x0000000140000000-0x0000000140004278-memory.dmp
      Filesize

      16KB