Behavioral task
behavioral1
Sample
04df0b3630c9872913c0875871678841.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
04df0b3630c9872913c0875871678841.exe
Resource
win10v2004-20220812-en
General
-
Target
04df0b3630c9872913c0875871678841.exe
-
Size
10KB
-
MD5
04df0b3630c9872913c0875871678841
-
SHA1
1c61e1adbe58268c579fb1318fff05b7af257fd8
-
SHA256
fc1aec3380708b62c71d3db53e1ec66b557b0e392dc1e1570fda978b6b6c9ed5
-
SHA512
30f347b8c7dbe1bf60a63e8d1eb372938030b40b8280db60184b3de2d73d2ec0a02aaf7f945f4515530f12343cbfa94f05936ce21b3abb8ba59d128d80cd6534
-
SSDEEP
96:0rSo2Iu+5eS2Xrg9918rDUlIGd/j4X6YmK7gd7IqdPI/R:0rezpS2XED1AD1mi7gdtd+R
Malware Config
Extracted
metasploit
metasploit_stager
101.43.82.156:6565
Signatures
-
Metasploit family
Files
-
04df0b3630c9872913c0875871678841.exe.exe windows x64
b4c6fff030479aa3b12625be67bf4914
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
VirtualAlloc
ExitProcess
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 132B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.iczc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE