Analysis

  • max time kernel
    0s
  • max time network
    0s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    13-09-2024 16:18

General

  • Target

    1_encoded.exe

  • Size

    7KB

  • MD5

    6c098287139a5808d04237dd4cdaec3f

  • SHA1

    aea943805649919983177a66d3d28a5e964da027

  • SHA256

    53932083665adaf933f3d524e1d8399ee4530e03b53d0d39fcbc227041e6a787

  • SHA512

    a9430d0661271f5f988aa14165b945faf4120cc7ed4f751e8f2f4498a7d7c74f03652f45c35035027e112976206054af831d5bd8909377b3947a8a87950afa47

  • SSDEEP

    24:eFGStrJ9u0/68nRnZdEBQAVr5ZuqknPzS2QUNSwlZpcnUpmB:is0lnhEBQcynu2QUPlZpcn3B

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

metasploit_stager

C2

144.34.162.13:3333

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1_encoded.exe
    "C:\Users\Admin\AppData\Local\Temp\1_encoded.exe"
    1⤵
      PID:2668

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2668-0-0x0000000140000000-0x00000001400042C8-memory.dmp

      Filesize

      16KB