Click to jump to signature section
Source: vpn.exe | Malware Configuration Extractor: Metasploit {"Type": "Shell Reverse Tcp", "IP": "209.141.35.225", "Port": 445} |
Source: vpn.exe | ReversingLabs: Detection: 94% |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 97.0% probability |
Source: vpn.exe | Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
Source: | Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: vpn.exe |
Source: Network traffic | Suricata IDS: 2034945 - Severity 1 - ET MALWARE Win32/Suspected Reverse Shell Connection : 192.168.2.5:49704 -> 209.141.35.225:445 |
Source: Joe Sandbox View | ASN Name: PONYNETUS PONYNETUS |
Source: unknown | TCP traffic detected without corresponding DNS query: 209.141.35.225 |
Source: unknown | TCP traffic detected without corresponding DNS query: 209.141.35.225 |
Source: unknown | TCP traffic detected without corresponding DNS query: 209.141.35.225 |
Source: unknown | TCP traffic detected without corresponding DNS query: 209.141.35.225 |
Source: unknown | TCP traffic detected without corresponding DNS query: 209.141.35.225 |
Source: unknown | TCP traffic detected without corresponding DNS query: 209.141.35.225 |
Source: vpn.exe | String found in binary or memory: http://www.apache.org/ |
Source: vpn.exe | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0 |
Source: vpn.exe | String found in binary or memory: http://www.zeustech.net/ |
Source: vpn.exe, type: SAMPLE | Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: vpn.exe, type: SAMPLE | Matched rule: Metasploit Payloads - file msf.exe Author: Florian Roth |
Source: 0.0.vpn.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 0.0.vpn.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Metasploit Payloads - file msf.exe Author: Florian Roth |
Source: 0.2.vpn.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 0.2.vpn.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Metasploit Payloads - file msf.exe Author: Florian Roth |
Source: 00000000.00000002.2053767004.0000000000590000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 00000000.00000002.2053608485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 00000000.00000000.2028933124.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: vpn.exe, 00000000.00000002.2053657455.0000000000415000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameab.exeF vs vpn.exe |
Source: vpn.exe | Binary or memory string: OriginalFilenameab.exeF vs vpn.exe |
Source: vpn.exe | Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
Source: vpn.exe, type: SAMPLE | Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: vpn.exe, type: SAMPLE | Matched rule: Msfpayloads_msf_10 date = 2017-02-09, hash1 = 3cd74fa28323c0d64f45507675ac08fb09bae4dd6b7e11f2832a4fbc70bb7082, author = Florian Roth, description = Metasploit Payloads - file msf.exe, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.0.vpn.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: 0.0.vpn.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Msfpayloads_msf_10 date = 2017-02-09, hash1 = 3cd74fa28323c0d64f45507675ac08fb09bae4dd6b7e11f2832a4fbc70bb7082, author = Florian Roth, description = Metasploit Payloads - file msf.exe, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.vpn.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: 0.2.vpn.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Msfpayloads_msf_10 date = 2017-02-09, hash1 = 3cd74fa28323c0d64f45507675ac08fb09bae4dd6b7e11f2832a4fbc70bb7082, author = Florian Roth, description = Metasploit Payloads - file msf.exe, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000000.00000002.2053767004.0000000000590000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: 00000000.00000002.2053608485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: 00000000.00000000.2028933124.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: vpn.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: classification engine | Classification label: mal100.troj.winEXE@4/0@0/1 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5668:120:WilError_03 |
Source: vpn.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\vpn.exe | Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: vpn.exe | ReversingLabs: Detection: 94% |
Source: unknown | Process created: C:\Users\user\Desktop\vpn.exe "C:\Users\user\Desktop\vpn.exe" | |
Source: C:\Users\user\Desktop\vpn.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\vpn.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd | Jump to behavior |
Source: C:\Users\user\Desktop\vpn.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\vpn.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\vpn.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: winbrand.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: wldp.dll | Jump to behavior |
Source: vpn.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: | Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: vpn.exe |
Source: C:\Users\user\Desktop\vpn.exe | Code function: 0_2_0040124D push eax; ret | 0_2_00401253 |
Source: C:\Users\user\Desktop\vpn.exe | Code function: 0_2_004064F2 push edx; iretd | 0_2_004064F3 |
Source: C:\Users\user\Desktop\vpn.exe | Code function: 0_2_00409120 push ebp; ret | 0_2_00409121 |
Source: C:\Users\user\Desktop\vpn.exe | Code function: 0_2_004055C8 push es; ret | 0_2_004055C9 |
Source: C:\Users\user\Desktop\vpn.exe | Code function: 0_2_004057B3 push edx; iretd | 0_2_004057B4 |
Source: C:\Users\user\Desktop\vpn.exe | Code function: 0_2_004031B9 push esi; ret | 0_2_004031E5 |
Source: vpn.exe | Static PE information: section name: .text entropy: 7.010747560238651 |
Source: all processes | Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: vpn.exe, 00000000.00000002.2053815231.000000000064E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: all processes | Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Users\user\Desktop\vpn.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd | Jump to behavior |
Source: Yara match | File source: vpn.exe, type: SAMPLE |
Source: Yara match | File source: 0.0.vpn.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.vpn.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000002.2053767004.0000000000590000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.2053608485.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000000.2028933124.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |