Static task
static1
Behavioral task
behavioral1
Sample
5e2a0e82cf16b17ee9604f394914ab14ad04d0ee4ea533e98b1e32170cf11efb.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
5e2a0e82cf16b17ee9604f394914ab14ad04d0ee4ea533e98b1e32170cf11efb.exe
Resource
win10v2004-20220414-en
General
-
Target
5e2a0e82cf16b17ee9604f394914ab14ad04d0ee4ea533e98b1e32170cf11efb
-
Size
37KB
-
MD5
2539e15bb5d8dac8f084e891530da8be
-
SHA1
6e36a510d61f7afddf089fc3f10171a127fba292
-
SHA256
5e2a0e82cf16b17ee9604f394914ab14ad04d0ee4ea533e98b1e32170cf11efb
-
SHA512
2dd16cc9f0dbcd64b47f5139ff47a1c63e9c446c59b239073af856978a552c719799678a90bb53ff57e60d69f9b024883527481a1e4c50a5996671a9ee0775d3
-
SSDEEP
384:YEOPUYgHUSsASveIkKk5FYI5TVisYpUwNNA4xd2bB:YEOcYgHUXASveIaXrYpLrA4xCB
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/shell_bind_tcp
Signatures
-
Metasploit family
Files
-
5e2a0e82cf16b17ee9604f394914ab14ad04d0ee4ea533e98b1e32170cf11efb.exe windows x86
53c83bcd4839ed36b462b2cbbfdbbe1b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
FreeLibrary
VirtualQuery
GetProcessHeap
HeapFree
HeapAlloc
GetLastError
GetModuleHandleW
GetStartupInfoW
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WideCharToMultiByte
MultiByteToWideChar
RaiseException
IsDebuggerPresent
GetProcAddress
vcruntime140d
__std_type_info_destroy_list
memset
_except_handler4_common
__vcrt_GetModuleFileNameW
__vcrt_GetModuleHandleW
__vcrt_LoadLibraryExW
memcpy
ucrtbased
__stdio_common_vsprintf_s
__p___argc
_initialize_onexit_table
_register_onexit_function
_execute_onexit_table
_crt_atexit
_crt_at_quick_exit
_controlfp_s
terminate
_wmakepath_s
_wsplitpath_s
wcscpy_s
strcpy_s
_set_fmode
_exit
exit
_initterm_e
_initterm
_get_initial_narrow_environment
_initialize_narrow_environment
_configure_narrow_argv
__setusermatherr
_set_app_type
_seh_filter_exe
_CrtDbgReportW
_CrtDbgReport
strcat_s
__p__commode
_set_new_mode
_configthreadlocale
_register_thread_local_exe_atexit_callback
_c_exit
_cexit
__p___argv
_seh_filter_dll
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ