Behavioral task
behavioral1
Sample
c258a0c93d985e997d590f515b1456d3ff1cad5554602ce7f68aeb15c05cf9eb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c258a0c93d985e997d590f515b1456d3ff1cad5554602ce7f68aeb15c05cf9eb.exe
Resource
win10v2004-20220812-en
General
-
Target
c258a0c93d985e997d590f515b1456d3ff1cad5554602ce7f68aeb15c05cf9eb
-
Size
9KB
-
MD5
047208d4a97bea53d1e1abfeef338c8e
-
SHA1
f6ace2556fd7ea30b769cba0f43d523161356030
-
SHA256
c258a0c93d985e997d590f515b1456d3ff1cad5554602ce7f68aeb15c05cf9eb
-
SHA512
9fec9d0985cc580b08b79c336316500e2b6c57dce5dc944538f989d1ae8df5e0f6a3229d8fd060652cff31585a411597c06e817d1e8e5a9707af154d190e6d8d
-
SSDEEP
12:etGSGQ/tLC2AsSMzRPOuW8hg+1DCZITXoEVbddwFdReiN/Y5Bj4:etGSrxCjsSiPOuW8uwDCZo4OdIY75B0
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
Metasploit family
Files
-
c258a0c93d985e997d590f515b1456d3ff1cad5554602ce7f68aeb15c05cf9eb.exe windows x86
a20dd2ba66f09466c6b1c180c7a3e2f0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
ExitProcess
VirtualProtect
Sections
.text Size: 512B - Virtual size: 96B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 132B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE