Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31/12/2024, 22:40
Behavioral task
behavioral1
Sample
fb00eb8b4f539f53c6e7bc7ca8f3c22071f695611bea8cb23d3939a999895730N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb00eb8b4f539f53c6e7bc7ca8f3c22071f695611bea8cb23d3939a999895730N.exe
Resource
win10v2004-20241007-en
General
-
Target
fb00eb8b4f539f53c6e7bc7ca8f3c22071f695611bea8cb23d3939a999895730N.exe
-
Size
72KB
-
MD5
82b9000adeb79317960d932e875eea40
-
SHA1
127e3b98fde06dd900409c15f6cbf599d538b161
-
SHA256
fb00eb8b4f539f53c6e7bc7ca8f3c22071f695611bea8cb23d3939a999895730
-
SHA512
3f42168b964f967d513b1b54940d9fa140fc017ea579b7cd226f4589cc14bf987a2ce810d40139ee84b24f97724cd5633aa117a798ce0a8bf9775e4244e25436
-
SSDEEP
1536:IUXj5i6tKUV+bkqjD82Q65WFKIrTMb+KR0Nc8QsJq39:lft9+brjo2QI/IrTe0Nc8QsC9
Malware Config
Extracted
metasploit
windows/reverse_http
http://192.168.93.128:8080/jSj1aHmSCBT-Qv9DmSWQjgT9Hyv5Z6ElbCDVoF-StRBoyj7jM-jKCjlzbxpjEGBYGY-JtboDQ-UknDwPIv-sm4xQtRCeTidU-ViRHn-WGeZ5L-uTcL33X4uxeW2Msin48rWhx-3EApbufwfMmaDs74Yp09WbR268wJoFqxeotdmVuTInbSGJu8jek3y
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb00eb8b4f539f53c6e7bc7ca8f3c22071f695611bea8cb23d3939a999895730N.exe