Behavioral task
behavioral1
Sample
718e395ee583bf4d7ba43976b73516cdd131db4cd854c1569d9f90e2f91166c2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
718e395ee583bf4d7ba43976b73516cdd131db4cd854c1569d9f90e2f91166c2.exe
Resource
win10v2004-20220812-en
General
-
Target
718e395ee583bf4d7ba43976b73516cdd131db4cd854c1569d9f90e2f91166c2
-
Size
4KB
-
MD5
6466769dbc70f9a12f61d7e5a5067910
-
SHA1
f6533ddfbe20c9e910fff7cdfb2bcf4f9b5d9ac3
-
SHA256
718e395ee583bf4d7ba43976b73516cdd131db4cd854c1569d9f90e2f91166c2
-
SHA512
d3673715573b8672bdbabb8468b19825c5ec4252a598039fa1cda129f70a1cfa982231809f9572563f50c7ca82f38650dd4f4eec47aa15c3f35b72681d8e6063
-
SSDEEP
48:6EoiOEwuffUa80YQ6ib57te91bOP9+fdyQS63fnGMsnfex14BRBGH:zobEwuffUaIqm9EmWGfn5UGz4pGH
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/shell_reverse_tcp
10.0.2.15:8969
Signatures
-
Metasploit family
Files
-
718e395ee583bf4d7ba43976b73516cdd131db4cd854c1569d9f90e2f91166c2.exe windows x86
f9ade0aa18f660a34a4fa23392e21838
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
ExitProcess
Sections
.text Size: 512B - Virtual size: 40B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE