Static task
static1
Behavioral task
behavioral1
Sample
36d8df3baebff6de9ab87d8d2596a27b2b447503866cdfe7887e916d5bff9f80.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
36d8df3baebff6de9ab87d8d2596a27b2b447503866cdfe7887e916d5bff9f80.exe
Resource
win10v2004-20220414-en
General
-
Target
36d8df3baebff6de9ab87d8d2596a27b2b447503866cdfe7887e916d5bff9f80
-
Size
11KB
-
MD5
4cac6230a6a28bb1e8d6741b1c3363d7
-
SHA1
69034271edec2046ba7a125aaad94dc4998158d4
-
SHA256
36d8df3baebff6de9ab87d8d2596a27b2b447503866cdfe7887e916d5bff9f80
-
SHA512
500134c435516aecd31b5a66fb5b091c47aac7578f0ba22a0db6b41d4bb18de76f68fc6c435a559c227eef826af54eefc799a58c12aacd130584f9e45b35a200
-
SSDEEP
192:TkopMAplAxev0CwXcKIFngr2cl6F90TZs1CM0n:Th8xev0Lac1swF
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
Metasploit family
Files
-
36d8df3baebff6de9ab87d8d2596a27b2b447503866cdfe7887e916d5bff9f80.exe windows x86
8b58a51c1fff9c4a944265c1fe0fab74
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
ExitProcess
GetModuleHandleA
GetProcAddress
SetUnhandledExceptionFilter
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
atexit
signal
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 644B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 96B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE