General

  • Target

    c15abaf51e78ca56c0376522d699c978217bf041a3bd3c71d09193efa5717c71.bin.sample.gz

  • Size

    7KB

  • MD5

    a191908d3d7dcb6ebf59dcecfedbdf60

  • SHA1

    90c8c3e5066c194658f315f7d087a4b38abd092d

  • SHA256

    2f6b20edaee4421bee9e3baf3c851a5f01cadbe261bc18e7f49bd8d41c77a0c0

  • SHA512

    bac87b0ac20236dfaeafdb79520145f17f64a7c22b0df5639938a1f559edce44cc44ae4fb7f9b0c642c3a37c1e406c5d22074bff9db559304974d23714fd0322

Score
10/10

Malware Config

Signatures

  • Detected SUPERNOVA .NET web shell 1 IoCs

    SUPERNOVA is a .NET web shell backdoor masquerading as a legitimate SolarWinds web service handler. SUPERNOVA inspects and reponds to HTTP requests with the appropriate HTTP query strings, Cookies, and/or HTML form values (e.g. named codes, class, method, and args).

  • Supernova family

Files

  • c15abaf51e78ca56c0376522d699c978217bf041a3bd3c71d09193efa5717c71.bin.sample.gz
    .gz
  • sample
    .dll windows x86