General

  • Target

    servel(4).bin.exe

  • Size

    72KB

  • MD5

    1ef9325f82a1cac6c5736fe75058216d

  • SHA1

    669a7c5d90a953dc7cb2464a36a586d50e8781a0

  • SHA256

    879c2ed90cbc0c34cae5d9024ca89c08398f3b3399cba31ad40ece9de7d70354

  • SHA512

    141261f57ae9228243947b0b4eb40a5386b1b4fdb438db6a79ce6229ef20611c538047aa08d1643bb4b7374de851157a216fc123825b801c75c02b658df2f8b4

  • SSDEEP

    1536:IJzZ4ORPcO+jhhlWMU5U0km/omFo2Mb+KR0Nc8QsJq39:OzxGphfUfov2e0Nc8QsC9

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.0.16:443

Signatures

Files

  • servel(4).bin.exe
    .exe windows x86

    481f47bbb2c9c21e108d65f52b04c448


    Headers

    Imports

    Sections