Analysis
-
max time kernel
130s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 01:06
Behavioral task
behavioral1
Sample
2b6648a967faf8eba2dd9983cd029e7bd06c20fc1afcac11a6987eda4e53288e.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2b6648a967faf8eba2dd9983cd029e7bd06c20fc1afcac11a6987eda4e53288e.exe
Resource
win10v2004-20241007-en
General
-
Target
2b6648a967faf8eba2dd9983cd029e7bd06c20fc1afcac11a6987eda4e53288e.exe
-
Size
72KB
-
MD5
1ce99ec258676582d196690ca433c76a
-
SHA1
a665f9aedf2e406b0d0f7bf16cc9e74b7a3d0b73
-
SHA256
2b6648a967faf8eba2dd9983cd029e7bd06c20fc1afcac11a6987eda4e53288e
-
SHA512
8f35fad37abf7dcd941f55c7ef783a19f7df892794da898b13254f092634f82b6fab74d860062c697e535043c3e66f04af6a59b387c2418fb0084557ff2db606
-
SSDEEP
1536:IjSeys3I7gPPjTbZdzLmK/eLd3dCf/anU4ePDMb+KR0Nc8QsJq39:cVd3IEPPzZB6K/8lIHaUje0Nc8QsC9
Malware Config
Extracted
metasploit
windows/reverse_http
http://89.197.154.116:7810/Dgh61oy-x6f-nP-dmcuf-QD5D-HTsnvgpPrU5ZqBaoF3yTiZFrT9qdHiiAYHFqJYJ8bL3Udk_BAnI7pooQnKoLkQmQXqW5gBJj1lJibOQFtDcbtsndU8PI4
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b6648a967faf8eba2dd9983cd029e7bd06c20fc1afcac11a6987eda4e53288e.exe