General

  • Target

    eb5676436b27d6b45c58d2c1b242a70730edf87d83bf37c91965fdf4f89e7ab8

  • Size

    45KB

  • MD5

    18b367529c07b94296d4f6991c7e872a

  • SHA1

    b7e3e3aa32bf4cde03d33ae8cb8fef9cd955b74a

  • SHA256

    eb5676436b27d6b45c58d2c1b242a70730edf87d83bf37c91965fdf4f89e7ab8

  • SHA512

    8ddd40f89c4b25cbba8600abbda1cc87006233c7fea747ea894c94d147ee51226cdc20982e39b9621dc89405e01b9e104e44eaa630a900839bc2854eb453b975

  • SSDEEP

    768:IXZnvOalrz/xOXXubazL0jf3fuZwjjt5klTwa5p+jE/Jh3k3nbmX9/32Lq3:IJnmvXzzL/ZGR5kDp+9uRsq3

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

windows/shell_bind_tcp

Signatures

  • Metasploit family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • eb5676436b27d6b45c58d2c1b242a70730edf87d83bf37c91965fdf4f89e7ab8
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections