General

  • Target

    b6d77b5e7c2fc3c47bdf24a57ef2b27f81331c0245340560971a4f7e80d10c53

  • Size

    404KB

  • MD5

    09c3f3744f9d690f86d1eb8aec46e220

  • SHA1

    c6fadd7ac2d818f12bb5966c1e025ec7521796e0

  • SHA256

    b6d77b5e7c2fc3c47bdf24a57ef2b27f81331c0245340560971a4f7e80d10c53

  • SHA512

    e898af09debfc614e0707bb5bc670fff7058eca78d9c565a0b5b0ff77b49c8b2a6d1c6a9b590172e7777391b2b2a1a2c5222d7d85258358f2c9cbddeac9cae07

  • SSDEEP

    6144:EQeW3lD8TTq1qBDRM5GO3MKMBmBbGezZIhu2k:EQeq98S1IRFuxGei6

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Signatures

  • Metasploit family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • b6d77b5e7c2fc3c47bdf24a57ef2b27f81331c0245340560971a4f7e80d10c53
    .exe windows x86

    c011637169bf8c2108a0db173f634245


    Headers

    Imports

    Sections