General

  • Target

    f0adfe9320d6e8ef2f8d6004fbe22d9464c8b4c642e4dc1f3e520b74610003d6

  • Size

    72KB

  • MD5

    1491c1b419e19798a688d411a678f360

  • SHA1

    9391087fcc863ac25e7d5ff72edf0096531b9bb1

  • SHA256

    f0adfe9320d6e8ef2f8d6004fbe22d9464c8b4c642e4dc1f3e520b74610003d6

  • SHA512

    898140aa6efc012244e9b9f66cc558f616cd3a5da5d8d5c5b866af3f508e3e4ba7eb08fe3c6b5cf59e2b97b26e15144fc3b2ee22a23bdfd9403e03495569c4cb

  • SSDEEP

    1536:IEraIec+1k+F+oVibeoZzAIOQ5q3x928Mu+GtMb+KR0Nc8QsJq39:FUBq3ofoZznx03xQbu+Gte0Nc8QsC9

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

68.0.192.40:1338

Signatures

Files

  • f0adfe9320d6e8ef2f8d6004fbe22d9464c8b4c642e4dc1f3e520b74610003d6
    .exe windows x86

    481f47bbb2c9c21e108d65f52b04c448


    Headers

    Imports

    Sections