General

  • Target

    1bee1a5350f61e092258ce3a0cd71280e5a20cd4269da1984d5c15fbdfbc7ebf

  • Size

    41KB

  • MD5

    93a609430cd77e40c9831b06676262e0

  • SHA1

    027e997ed25300be4486afecc10e853f520c634f

  • SHA256

    1bee1a5350f61e092258ce3a0cd71280e5a20cd4269da1984d5c15fbdfbc7ebf

  • SHA512

    befcf374d89ef5fe7f89647d6f6d0d695073144b7c50b12a093dcad7ae3eb28a1c94d8e78046fed0e6570c851a0fb7767d7429b54f565f4f6c0804a50af37283

  • SSDEEP

    768:Ip/ui5SnxJ3d+KCD/1xrSCNlygF0MQ8rq9P2f3HLIyhhJQvpH2q3:Ipe96j7UgF2JAcyhh6Aq3

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Signatures

  • Metasploit family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 1bee1a5350f61e092258ce3a0cd71280e5a20cd4269da1984d5c15fbdfbc7ebf
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections