Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09-06-2024 09:22
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-09_be0e2dad9110b985790411c990ca27c5_magniber.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-09_be0e2dad9110b985790411c990ca27c5_magniber.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-09_be0e2dad9110b985790411c990ca27c5_magniber.exe
-
Size
25.4MB
-
MD5
be0e2dad9110b985790411c990ca27c5
-
SHA1
d929e9ad0938d514830572c1730d2220da2ca3f3
-
SHA256
1173eb5d52de180b8574b0eef86deaa96742100e8f576c0ddf2fd077b68712de
-
SHA512
2552ee707e1884f3dc364f880c1af191b26ee33652119c26d0eabd4e7ebab4163b4747bab2bc65c8e2484672f96e6871b6e3fef8602aa50dc0fb7f4bd0567ac6
-
SSDEEP
786432:oBH2NK3aPR/1jypbGt++o+pDeMG8HFEjhVVdf:oBHKK+reQt++ppaX8EXL
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
192.168.106.187:1234
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1688-0-0x00000000003F0000-0x00000000003F1000-memory.dmpFilesize
4KB
-
memory/1688-1-0x0000000000400000-0x0000000001D6A000-memory.dmpFilesize
25.4MB
-
memory/1688-2-0x0000000000400000-0x0000000001D6A000-memory.dmpFilesize
25.4MB
-
memory/1688-3-0x00000000003F0000-0x00000000003F1000-memory.dmpFilesize
4KB