General
-
Target
testbdV4.exe
-
Size
72KB
-
Sample
220504-jemwlsfhdm
-
MD5
b504261917e344e2dd943a9ae0979951
-
SHA1
d8dbba5fc9a478cbc46b1409e398738e7427b4e0
-
SHA256
68ac6ae7796a1036b86bae008370c342a99e368a7b77948d9701613362db7a2f
-
SHA512
ee518aa9ae57b21cd00635629e3c360227e96fd5b9165cabef55606e69c847dd0dee54f16b46ff3839dd606f3d66ef1c2f17a60557af3273fa564199adf1a83d
Static task
static1
Behavioral task
behavioral1
Sample
testbdV4.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
testbdV4.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
10.0.2.15:12345
Targets
-
-
Target
testbdV4.exe
-
Size
72KB
-
MD5
b504261917e344e2dd943a9ae0979951
-
SHA1
d8dbba5fc9a478cbc46b1409e398738e7427b4e0
-
SHA256
68ac6ae7796a1036b86bae008370c342a99e368a7b77948d9701613362db7a2f
-
SHA512
ee518aa9ae57b21cd00635629e3c360227e96fd5b9165cabef55606e69c847dd0dee54f16b46ff3839dd606f3d66ef1c2f17a60557af3273fa564199adf1a83d
-