General

  • Target

    961916b0646baca7cf777cf1abd3d980fd7586e4b73618d3ad22a5f7e9294bce

  • Size

    1.3MB

  • MD5

    057e931a8bb171c2f370e54ab5addbfa

  • SHA1

    99a26715d07c74e05b8e3619b713328fc6b6019f

  • SHA256

    961916b0646baca7cf777cf1abd3d980fd7586e4b73618d3ad22a5f7e9294bce

  • SHA512

    7d495493c821cf7aace8414dfb33383737e4c66353145e3ee659385884dde22d93fc83dd1bebce830b80ad8c171327942afcb23aa3e70a454c936f3f63f4d9ed

  • SSDEEP

    24576:4LXJ7b4IXFO6NfIgkeC60Vn4Oe9Mtw0NEMa22ghjYuTlUgFRnkwox8JtLcddTNWb:Mw6GgkeX64N+w0NEH2bhjnTv8woxGw/k

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.1.176:4410

Signatures

  • Metasploit family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 961916b0646baca7cf777cf1abd3d980fd7586e4b73618d3ad22a5f7e9294bce
    .exe windows x86


    Code Sign

    Headers

    Sections