Behavioral task
behavioral1
Sample
8ef949255658a9adcdb2b039bc16b386366a282d672afb6b866c3c1b8b05e08b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8ef949255658a9adcdb2b039bc16b386366a282d672afb6b866c3c1b8b05e08b.exe
Resource
win10v2004-20220812-en
General
-
Target
8ef949255658a9adcdb2b039bc16b386366a282d672afb6b866c3c1b8b05e08b
-
Size
569KB
-
MD5
4b330049f2c8e52f7b46058dd92a15a0
-
SHA1
7db3bea763cb699b43bc75f14946e6a12a1169b6
-
SHA256
8ef949255658a9adcdb2b039bc16b386366a282d672afb6b866c3c1b8b05e08b
-
SHA512
f93d006dec6b7ef1699d3dee0233c8f82173b70cca9d1427e8268389d8af86358b4e254f1f4cd6729cbf3b12b8718d6a0d486ea48d6fdc0a91cba2c53b9140bf
-
SSDEEP
12288:AM/jLBgpZZVlLS6Y+oux9Q4T9x1l1NNgTz1mOeCbw:f/jNgpZZVlFY+o+S4Zx1l1NNg370
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
96.32.95.218:4444
Signatures
-
Metasploit family
Files
-
8ef949255658a9adcdb2b039bc16b386366a282d672afb6b866c3c1b8b05e08b.exe windows x86
af872607bae65aa7527b92ac83f053e7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CloseHandle
CreateSemaphoreA
DeleteCriticalSection
EnterCriticalSection
ExitProcess
GetCommandLineA
GetCurrentThreadId
GetLastError
GetModuleHandleA
GetProcAddress
InitializeCriticalSection
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsDBCSLeadByteEx
LeaveCriticalSection
MultiByteToWideChar
ReleaseSemaphore
SetLastError
SetUnhandledExceptionFilter
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
msvcrt
_fdopen
_lseek
_read
_strdup
_stricoll
_write
__getmainargs
__mb_cur_max
__p__environ
__p__fmode
__set_app_type
_cexit
_errno
_filbuf
_findclose
_findfirst
_findnext
_flsbuf
_fstat64
_fullpath
_iob
_onexit
_setmode
abort
atexit
atoi
calloc
fclose
fflush
fopen
fputc
fputs
fread
free
fseek
ftell
fwrite
getwc
isspace
iswctype
localeconv
malloc
mbstowcs
memchr
memcmp
memcpy
memmove
memset
putwc
realloc
setlocale
setvbuf
signal
sprintf
strchr
strcmp
strcoll
strerror
strftime
strlen
strncpy
strtod
strxfrm
system
tolower
towlower
towupper
ungetc
ungetwc
vfprintf
vsprintf
wcscoll
wcsftime
wcslen
wcstombs
wcsxfrm
Sections
.text Size: 373KB - Virtual size: 373KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eh_fram Size: 135KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE