General

  • Target

    0e1aa5bb7cdccacfa8cbfe1aa71137b361bea04252fff52a9274b32d0e23e3aa

  • Size

    304KB

  • MD5

    212e208c9346bc876f03a3ea898b6236

  • SHA1

    14f2b841f1fed067aad3e13007f9746fa0c26a56

  • SHA256

    0e1aa5bb7cdccacfa8cbfe1aa71137b361bea04252fff52a9274b32d0e23e3aa

  • SHA512

    298da93e147a4336610b550d49bce4a2defd30ec1a7839accd0d785da417e9a649972c75249c355fa77d1ec462fa4a97c132880d96f06a4d92f1f8c0e0bd4216

  • SSDEEP

    6144:RCElzEuYJSuIznnP7cgDXAfnY4EpseVcWmO2yTw80WoABqzMoRXZWd2:RCA4uLnpqEpcWmO2yTw8EFZ

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_http

C2

http://powershell.services:4443/gcG5TQhfRGHOuc-4kU_xsgS9Ttm6bUAjWnQGwohZ1G1OxNjG_NSVrE0AWjeqsBjNIDQQPEqA5DHxmlZxjkDzDI

Signatures

Files

  • 0e1aa5bb7cdccacfa8cbfe1aa71137b361bea04252fff52a9274b32d0e23e3aa
    .exe windows x86

    58e6707dda8020468bb8f9a4f9194e0a


    Headers

    Imports

    Sections