Behavioral task
behavioral1
Sample
7af6c41c62374165f923fc629fcd4ea1f7ce0b9451a0c0e26fa61bdd11534f6e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7af6c41c62374165f923fc629fcd4ea1f7ce0b9451a0c0e26fa61bdd11534f6e.exe
Resource
win10v2004-20220901-en
General
-
Target
7af6c41c62374165f923fc629fcd4ea1f7ce0b9451a0c0e26fa61bdd11534f6e
-
Size
6.1MB
-
MD5
6a51a731c7a7ee3a5b7c6490e46c1fce
-
SHA1
bf6b380af2f8a77f452d33d1cf8936d8444f0664
-
SHA256
7af6c41c62374165f923fc629fcd4ea1f7ce0b9451a0c0e26fa61bdd11534f6e
-
SHA512
d26e259c64737bf8c2b38a882f12b4451ff150fee4c19523098370d19f7d7f626e47656d24f9922325ece69765358c9c81866f0f853f7455cbf4bafdd5a3fffb
-
SSDEEP
24576:v9/OLnn9yPELtb6RNT/q5SJ7UmOjhTOok0DgOYjibhpiEY:4ngJU1T3br
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
Metasploit family
Files
-
7af6c41c62374165f923fc629fcd4ea1f7ce0b9451a0c0e26fa61bdd11534f6e.exe windows x86
87bed5a7cba00c7e1f4015f1bdae2183
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
Sections
kkrunchy Size: 6.1MB - Virtual size: 6.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE