Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2024 03:32
Behavioral task
behavioral1
Sample
8570e597dd56272bd52960d75b75de1d5d588f5c3281b213303af06fb6b602ee.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8570e597dd56272bd52960d75b75de1d5d588f5c3281b213303af06fb6b602ee.exe
Resource
win10v2004-20241007-en
General
-
Target
8570e597dd56272bd52960d75b75de1d5d588f5c3281b213303af06fb6b602ee.exe
-
Size
72KB
-
MD5
41ad011a481f234b8f66e6722f529365
-
SHA1
2ff821ec1ff69c7a08483223480eb2f078b989b7
-
SHA256
8570e597dd56272bd52960d75b75de1d5d588f5c3281b213303af06fb6b602ee
-
SHA512
c8eff85c426bcbfd7760793498e7142765f3eaf52a3192fa95b5f4f51371dcec97528e004fcdffd97e11b2a3b71741083dbf18cae7e18d156cf2b2ef1ec37b62
-
SSDEEP
1536:IGoAufiWu14aTU1Yg9mfgpV750Mb+KR0Nc8QsJq39:j//uaTU1Yg9ZVF0e0Nc8QsC9
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
185.133.251.112:6969
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8570e597dd56272bd52960d75b75de1d5d588f5c3281b213303af06fb6b602ee.exe