Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 05:47
Behavioral task
behavioral1
Sample
evil1.exe
Resource
win10v2004-20240426-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
evil1.exe
-
Size
72KB
-
MD5
21ecd49976f4b45734464ac38eab9087
-
SHA1
fc26a7bedc8b13d63f072bb2f23494dd0a633dcf
-
SHA256
71f935580e13480525e9650b49dc743b9d06c71b81d449626793c9160194c251
-
SHA512
03b9f0aef143306960b15973c038fcd73885fadf2695974c5e12533c576345948aa0b93a613c4618298e9ae5db95b7f970e4082b9f884d0005d0cc202089f322
-
SSDEEP
1536:Ijw8lvtt92dG7L9UE0Rb40QEXZ+d2sMb+KR0Nc8QsJq39:NQvHQd40QE8e0Nc8QsC9
Score
10/10
Malware Config
Extracted
Family
metasploit
Version
windows/reverse_tcp
C2
87.96.21.84:443
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3964-0-0x0000000000490000-0x0000000000491000-memory.dmpFilesize
4KB