Behavioral task
behavioral1
Sample
2d5a44d279eb735b0276e23903e7cb55cce453e8777f5c4a47b080a76df60dda.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2d5a44d279eb735b0276e23903e7cb55cce453e8777f5c4a47b080a76df60dda.exe
Resource
win10v2004-20220901-en
General
-
Target
2d5a44d279eb735b0276e23903e7cb55cce453e8777f5c4a47b080a76df60dda
-
Size
6KB
-
MD5
46635428b0bf633604705a8be70dcef3
-
SHA1
a7e1649228f0bba95ce44d108d6ad32cde27fe29
-
SHA256
2d5a44d279eb735b0276e23903e7cb55cce453e8777f5c4a47b080a76df60dda
-
SHA512
c5e307f0f193960153706ef85cebf996e079e204cda6e5e929644b44ad6135988043bdcdc03d09e8f1b2c1bd2434da63e81e11062c6acb120f3cc7638f47fb0a
-
SSDEEP
96:0Fy7dQ3KdJ6oze2jsMfGKRpsBVrIHR0stTOS:0FQQ6dJ6l2vfRRwVrkR0sA
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
Metasploit family
Files
-
2d5a44d279eb735b0276e23903e7cb55cce453e8777f5c4a47b080a76df60dda.exe windows x64
b4c6fff030479aa3b12625be67bf4914
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
VirtualAlloc
ExitProcess
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 132B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ