Analysis
-
max time kernel
105s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 01:14
Behavioral task
behavioral1
Sample
Trojan.Win32.Meterpreter.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Trojan.Win32.Meterpreter.exe
Resource
win10v2004-20240802-en
General
-
Target
Trojan.Win32.Meterpreter.exe
-
Size
72KB
-
MD5
ce38fcf4273d92c605286df44d28eb50
-
SHA1
14dc27dcd11fb4ddd2b14e7ce1370629c7afd0ae
-
SHA256
cb044fcd02f3eef320c79cfcce2f28e690b88172e5af77fdc1716a071461da10
-
SHA512
451dfca3fbcd99c5857a63e3388bd1f49da90b2c9a93c050601b254b86283565effe201d5820f987103dfcb573c52631f8341f425a3d8b438ef2c2958d3556d1
-
SSDEEP
1536:IQx/vOdR1SvlEZxZjZd3LH4GNLxRYKNMb+KR0Nc8QsJq39:l0RsSbtZdbH9NvYKNe0Nc8QsC9
Malware Config
Extracted
metasploit
windows/reverse_tcp
192.168.137.129:4444
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan.Win32.Meterpreter.exe