Malware Analysis Report

2025-01-03 08:23

Sample ID 240705-ews2qsvdjf
Target ea0640d06bca5c702804da7d17c8a24b0f6aeb50f362fb35c2e4788a2656ad20
SHA256 ea0640d06bca5c702804da7d17c8a24b0f6aeb50f362fb35c2e4788a2656ad20
Tags
metasploit backdoor trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

ea0640d06bca5c702804da7d17c8a24b0f6aeb50f362fb35c2e4788a2656ad20

Threat Level: Known bad

The file ea0640d06bca5c702804da7d17c8a24b0f6aeb50f362fb35c2e4788a2656ad20 was found to be: Known bad.

Malicious Activity Summary

metasploit backdoor trojan

MetaSploit

Metasploit family

Unsigned PE

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-07-05 04:17

Signatures

Metasploit family

metasploit

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-07-05 04:17

Reported

2024-07-05 07:30

Platform

win7-20240220-en

Max time kernel

120s

Max time network

124s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ea0640d06bca5c702804da7d17c8a24b0f6aeb50f362fb35c2e4788a2656ad20.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\ea0640d06bca5c702804da7d17c8a24b0f6aeb50f362fb35c2e4788a2656ad20.exe

"C:\Users\Admin\AppData\Local\Temp\ea0640d06bca5c702804da7d17c8a24b0f6aeb50f362fb35c2e4788a2656ad20.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C echo 'OS{c0a94747625895b988881100de4b7b8b}'

Network

N/A

Files

memory/2388-0-0x0000000000020000-0x0000000000021000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-07-05 04:17

Reported

2024-07-05 07:31

Platform

win10v2004-20240508-en

Max time kernel

90s

Max time network

50s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ea0640d06bca5c702804da7d17c8a24b0f6aeb50f362fb35c2e4788a2656ad20.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\ea0640d06bca5c702804da7d17c8a24b0f6aeb50f362fb35c2e4788a2656ad20.exe

"C:\Users\Admin\AppData\Local\Temp\ea0640d06bca5c702804da7d17c8a24b0f6aeb50f362fb35c2e4788a2656ad20.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C echo 'OS{c0a94747625895b988881100de4b7b8b}'

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp

Files

N/A