Analysis
-
max time kernel
135s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 07:45
Behavioral task
behavioral1
Sample
e838929d2cd15646c7c5ecbeca160b7495b09668b64b17946abfdcd23cdfc36b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e838929d2cd15646c7c5ecbeca160b7495b09668b64b17946abfdcd23cdfc36b.exe
Resource
win10v2004-20241007-en
General
-
Target
e838929d2cd15646c7c5ecbeca160b7495b09668b64b17946abfdcd23cdfc36b.exe
-
Size
63KB
-
MD5
46ef3213d29821a2c4bac9fca9990dd0
-
SHA1
a81ab7a2914794b5e9ea92491c13d69539e59744
-
SHA256
e838929d2cd15646c7c5ecbeca160b7495b09668b64b17946abfdcd23cdfc36b
-
SHA512
c39998bcc2db23d79f62c323cf1e57d02096ddc1353246b22aba27b79bcaf4645fb223fe63a5fe7c7ace2f8ae7a75f5ce8f7286072a1f3b643fe386d81f0b583
-
SSDEEP
384:sb5Dn14aBRPxi6qE3eTvaunyAYsUx0JIFItDzx1/Uq+QHzYylC9jI/QfBhQAQRPH:8BR8YGyhs0lFOXUBGTC9FBdQzA89J
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
192.168.235.129:1234
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family