Analysis
-
max time kernel
96s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 19:29
Static task
static1
Behavioral task
behavioral1
Sample
Trojan.Win32.Meterpreter.RPZ.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Trojan.Win32.Meterpreter.RPZ.exe
Resource
win10v2004-20240802-en
General
-
Target
Trojan.Win32.Meterpreter.RPZ.exe
-
Size
5KB
-
MD5
7db52ce24852f75fcf0f23e47c2b5850
-
SHA1
66332917a7e8b7d2b93548a5fd6b96d474d80137
-
SHA256
69cff855772fffa1207444ca7bcf9fe259d757d67baae4c24d028525c74b3b73
-
SHA512
ad420c312e43d0e6202e63395192560db651b2988b3c4ec3058054189fa13e5bfe9e5c9baa10a1841e971c0ecfb0eedacb9620ceeb3b3a1e3a5d73c7edfffa73
-
SSDEEP
96:13u+KINu62Gnn9asTU9ig+aGs7YdDjSY+Caw/NXs5ApAJZa6JhduV0:1e+TN52+Ui+GsgaYp0qyaYhduV0
Malware Config
Extracted
metasploit
windows/reverse_tcp
5.180.45.105:2006
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan.Win32.Meterpreter.RPZ.exe