Analysis

  • max time kernel
    13s
  • max time network
    22s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-09-2024 18:06

General

  • Target

    reverse.exe

  • Size

    7KB

  • MD5

    862e4148018b420063f6884b594d1a05

  • SHA1

    151896764c8c71b8b2462a7a2f3b859cb71df8ae

  • SHA256

    5bd5e24c42f25fc7227224896057350497bb3d37a8242404e093a04960d976e1

  • SHA512

    3cd47d516fd9f1d4ff7d320a1f83fdeae0b067a8e93d028bf1ee836b7f040a3c36f5942ee225d54c92a3137ad83b16c060941649a664182739e8c10dff85469e

  • SSDEEP

    24:eFGStrJ9u0/6nHnZdkBQAV2G1k/wKLqFx1eNDMSCvOXpmB:is0mjkBQW+Ilx1SD9C2kB

Malware Config

Extracted

Family

metasploit

Version

metasploit_stager

C2

147.185.221.20:36125

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

Processes

  • C:\Users\Admin\AppData\Local\Temp\reverse.exe
    "C:\Users\Admin\AppData\Local\Temp\reverse.exe"
    1⤵
      PID:1680

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1680-0-0x0000000140000000-0x0000000140004278-memory.dmp

      Filesize

      16KB