Behavioral task
behavioral1
Sample
b4fa08795c4a491b6dd2f32f039e86b71c80f253eb4aa9ae99fb91c567d2fda5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b4fa08795c4a491b6dd2f32f039e86b71c80f253eb4aa9ae99fb91c567d2fda5.exe
Resource
win10v2004-20221111-en
General
-
Target
b4fa08795c4a491b6dd2f32f039e86b71c80f253eb4aa9ae99fb91c567d2fda5
-
Size
277KB
-
MD5
f9e0da1fd8c6939bc249a939d0d29d66
-
SHA1
10e31d56bccb2f1b43fb06b3a2cde26172a853bc
-
SHA256
b4fa08795c4a491b6dd2f32f039e86b71c80f253eb4aa9ae99fb91c567d2fda5
-
SHA512
bc85d76bb2e6b04d54acc6df94c6c09e5271bc29b9a951effe3e820d27303fba2ecb5ccaab53e4f065c00085a5d620ef6bc6db6b57605b6f39d2d3b6cae253f5
-
SSDEEP
6144:soonclzMFI2PM6v3LhCLAXfYiC11m8B7efv7UUMY:rec5MFJ/jhCOPC1E8B7U
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
Metasploit family
Files
-
b4fa08795c4a491b6dd2f32f039e86b71c80f253eb4aa9ae99fb91c567d2fda5.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 164KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE