Analysis

  • max time kernel
    212s
  • max time network
    203s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    04-07-2024 17:59

General

  • Target

    virus.exe

  • Size

    72KB

  • MD5

    f6059fd02286a28725bbf32da112096c

  • SHA1

    9b7d4c3ef9d2a0feb11ad6389000fee0eecd5275

  • SHA256

    628271669a0d2d8579cbe23128e1df7bcfa52f791f8caa597236a6bb031a6233

  • SHA512

    0f5d3307a7122a345a5e4fc1e386523bb4b9a348cf39f28942bcbb1a9765847ddc9ff6dd54c8c3e5852314f9dfd02b199115511e7a310dd79c1811651fd348f8

  • SSDEEP

    1536:IteXQFYyXi4XYcFyaV8bK+vmO6V1eVOMb+KR0Nc8QsJq39:AeAnXXY28bCJwOe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.75.128:4444

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

Processes

  • C:\Users\Admin\AppData\Local\Temp\virus.exe
    "C:\Users\Admin\AppData\Local\Temp\virus.exe"
    1⤵
      PID:2012

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2012-0-0x0000000000020000-0x0000000000021000-memory.dmp
      Filesize

      4KB