Analysis
-
max time kernel
94s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 18:15
Behavioral task
behavioral1
Sample
59606be0825c78bfd6fe8ebaddc176c0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
59606be0825c78bfd6fe8ebaddc176c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
59606be0825c78bfd6fe8ebaddc176c0N.exe
-
Size
138KB
-
MD5
59606be0825c78bfd6fe8ebaddc176c0
-
SHA1
9cbfb72b6cbf3b6e9efe193a3f1d66ead5c50bac
-
SHA256
ec67cfad97d6228f07aa94281e3e0ac07e4422800f931caccf06c9ea9aecb5da
-
SHA512
04ed8975cdb924fd242ad7d40dec70bc64f4ff4a3f5b3e7333766231aceede0722ad823f27f1775062037a8795ded1d0b661cc167a5ca540d12232f623b1834f
-
SSDEEP
1536:pkitkaCaP1/VgXg1H569DskvWhJFjMTz68d32YrgtpGars3u6NaPV8PpS9oxOVvS:pkiuA1/nKd5lO0u5V3oH
Malware Config
Extracted
metasploit
windows/shell_bind_tcp
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.