General

  • Target

    5baae524aefb238484050b25ea59d7ddc117aca86353e08b0c536a9fd4084b49

  • Size

    43KB

  • MD5

    a5fc20b3de74b919e25dc6094f20f96e

  • SHA1

    e20ea65dcd488faa8e0e032efce2a59d425f75ed

  • SHA256

    5baae524aefb238484050b25ea59d7ddc117aca86353e08b0c536a9fd4084b49

  • SHA512

    fbce0c754daf0798401c55c2a3d9f1a87baac9e56b18e66f182a4c2e3e0239dd7eeb6dcd6a1bd0302e7016b73ed331760bc40838d066ca8ea0998e67cbed99c7

  • SSDEEP

    768:aI/5bIzKujQI2R1KUnIdKc8ugHNtrneruReAuCrsJOoBvGjZnTs2PVsVLLqGvTBn:aIRszKGv2RkUnIdKcRgHNtrnFK/soBvb

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

10.10.30.59:4444

Signatures

Files

  • 5baae524aefb238484050b25ea59d7ddc117aca86353e08b0c536a9fd4084b49
    .zip

    Password: infected

  • 591CA685BE7BB530C781E0F76C6D8BA98982C53CAC4F21D5C4D11B1B60144009
    .exe windows x86

    481f47bbb2c9c21e108d65f52b04c448


    Headers

    Imports

    Sections