Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 06:46
Behavioral task
behavioral1
Sample
2024-06-14_e8360804a99ff55ae2919ef153ad05d4_avoslocker_magniber.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-14_e8360804a99ff55ae2919ef153ad05d4_avoslocker_magniber.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-14_e8360804a99ff55ae2919ef153ad05d4_avoslocker_magniber.exe
-
Size
8.4MB
-
MD5
e8360804a99ff55ae2919ef153ad05d4
-
SHA1
061c50636585e62c76e951e902cc03ebdfadabd4
-
SHA256
bded3addc990fa93827a6cfbf9687076df89cead996396e443d4465c4de43aba
-
SHA512
2b4e53a2a7797f2a52c28908cf9141c80c75c54b25b6842b04994ecfae1e5aab92dd7c17b2a032cf6349c8e51705d845d9b5cc9269c344d0edb58bacfc97fdcb
-
SSDEEP
98304:mSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSvSSSSSSSSSSSSSSSlwwwwwwwwwwwwww7:1wJKZ/TaCgQdWNXx8A0PqPjNLa5
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
172.16.1.4:1234
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.