Analysis
-
max time kernel
105s -
max time network
94s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 03:20
Behavioral task
behavioral1
Sample
64434aed969d70c69c6424b80a142b6a93e38c27558bdfa36559073aac7db11bN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
64434aed969d70c69c6424b80a142b6a93e38c27558bdfa36559073aac7db11bN.exe
Resource
win10v2004-20240802-en
General
-
Target
64434aed969d70c69c6424b80a142b6a93e38c27558bdfa36559073aac7db11bN.exe
-
Size
98KB
-
MD5
ddf155cc7db21d126c518ce998a73140
-
SHA1
749eb4759f7ca295c9faf5c88bbf9e8d765c4b98
-
SHA256
64434aed969d70c69c6424b80a142b6a93e38c27558bdfa36559073aac7db11b
-
SHA512
835b3bcff1b7235d3961b4409e0978ba2634b2870a060dc08ba137c224a10cbf4e10602c0578c7e664ca4a16742c4bed060455cd69176093d4ee34c407db7626
-
SSDEEP
1536:moqtFiOQZiUZOCbEIxvlRQ/PBi2BPKsM6GdLSd4UL:VRUL
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
192.168.10.141:443
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.