Analysis
-
max time kernel
130s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 03:43
Behavioral task
behavioral1
Sample
payload.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
payload.exe
Resource
win10v2004-20241007-en
General
-
Target
payload.exe
-
Size
72KB
-
MD5
87e091c089a340ada55165c895294b69
-
SHA1
8f255e44a86a4f3639e8a760a9b34330577f0032
-
SHA256
02d27da054b4a2dcc87043ef2a3367192d1cf04e69f2e5453a56b75ae379e036
-
SHA512
86cfbf58ea96532fa90fb3eeaacbbe9a59b90ce44ef9bcbafdc5c1c267eee77d07ba8f99130696d23af6da7ebfece50468ef5a83b715f64ce6e54e4687569dde
-
SSDEEP
1536:IeHuvdXIXQuRP3SklWhM5cDr54Mb+KR0Nc8QsJq39:tq+XlcgcDrWe0Nc8QsC9
Malware Config
Extracted
metasploit
windows/reverse_http
http://192.168.229.128:4444/0IwujDF71i564XvgHYvM9APLfQeplMaCMpZFUW-Zk
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language payload.exe