Analysis
-
max time kernel
42s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
19-06-2024 15:10
Behavioral task
behavioral1
Sample
windows-meterpreter-staged-reverse-tcp-443.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
windows-meterpreter-staged-reverse-tcp-443.exe
Resource
win10v2004-20240226-en
General
-
Target
windows-meterpreter-staged-reverse-tcp-443.exe
-
Size
72KB
-
MD5
1fc6bf4f6f13847e4a770f4d35c5b37a
-
SHA1
b60dd5dd0b69aa479e32d9d0b4aa5b227cbce651
-
SHA256
ede7096b43620cf4ce1f7d2feef6d14c795fb92dc933097332216e8ce679e167
-
SHA512
ecd6ef1bcadf6585562e8a2cbaba8fd7723f7dd4e06549f59feeeffd873a241711452eda8fd950a3e94c47df2a3147e7a8398ee7851fbef8dff50c1da753f14d
-
SSDEEP
1536:IO7q0KQZUogjU+amgsVFSlhS8YjZMb+KR0Nc8QsJq39:rGomUnOIHgZe0Nc8QsC9
Malware Config
Extracted
metasploit
windows/reverse_tcp
192.168.1.217:443
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.