Static task
static1
Behavioral task
behavioral1
Sample
krwNsWDZJ.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
krwNsWDZJ.exe
Resource
win10v2004-20220414-en
General
-
Target
krwNsWDZJ.virus
-
Size
4KB
-
MD5
1f22e11d0f91d1e2e32ef5d5b8951767
-
SHA1
2af16c31f88ec756bba2d6777730842f1b7d518c
-
SHA256
2cd455a348b55ca3809ce16bad516a37f798370e9cd264303e327ef147b6c613
-
SHA512
d7fb6079fe1f02baf46bbfb812d2c3144b32cd43ea36485184ea85d085fc425ca59301e7321a1c1f8da0df8392e5317ff526726d262d2ae62ab9326ae9d1c636
-
SSDEEP
48:6PiecTCNmAkfRLh+jINpwITn6pwBiqeambgEhVXGVhvUzxXFXt0l/jbzL/rBIpZ:+hNoRdISiiv9MUEbEvUzx1SlLXL/rupZ
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
10.97.56.220:4444
Signatures
-
Metasploit family
Files
-
krwNsWDZJ.virus.exe windows x86
f9ade0aa18f660a34a4fa23392e21838
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
ExitProcess
Sections
.text Size: 512B - Virtual size: 40B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE