Behavioral task
behavioral1
Sample
2414806869769b0d0a43f9325521a18ca83503e9259ca581e569826e956fc352.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2414806869769b0d0a43f9325521a18ca83503e9259ca581e569826e956fc352.exe
Resource
win10v2004-20220812-en
General
-
Target
2414806869769b0d0a43f9325521a18ca83503e9259ca581e569826e956fc352
-
Size
333KB
-
MD5
0c2ae24dc589c44845e602c5a93d16c0
-
SHA1
4724ba06468c23f71ffb85482d7f4ff817fcbf96
-
SHA256
2414806869769b0d0a43f9325521a18ca83503e9259ca581e569826e956fc352
-
SHA512
d5c6b9db9a8cb8d3e8051eca1fef90bb694a7c70ec76eece1c875591cc4190ca4ff6c7a6e6818a5dbe7431cb4079a9f1f6e75dcd32c9d7f68e5bf82146086041
-
SSDEEP
6144:/7CEAXcdUfA6Uicd8XMfjj5xvr80BDun+sImy67c2qZ:/7MXcdUI6U2kTvrTBDYb3y6U
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/shell_reverse_tcp
192.168.228.128:443
Signatures
-
Metasploit family
Files
-
2414806869769b0d0a43f9325521a18ca83503e9259ca581e569826e956fc352.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
LZI0 Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
LZI1 Size: 202KB - Virtual size: 204KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE