Behavioral task
behavioral1
Sample
af47c89565c5b066943b583c4f8210345faca97bf1e41e7d581d41f98c85245f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
af47c89565c5b066943b583c4f8210345faca97bf1e41e7d581d41f98c85245f.exe
Resource
win10v2004-20220812-en
General
-
Target
af47c89565c5b066943b583c4f8210345faca97bf1e41e7d581d41f98c85245f
-
Size
11KB
-
MD5
0e4bda0367fab96d055142fcb3a78640
-
SHA1
4b73b74bfd702fc0d1418993b441613b16da8787
-
SHA256
af47c89565c5b066943b583c4f8210345faca97bf1e41e7d581d41f98c85245f
-
SHA512
d6f73f6863a8baa81af57478403fdac75d8f460f23cb3e5987431d89ee2ef271f37fffc5aca1af29a160945df44b5ec6c8c4591d6eb776273906f64988e3dcb8
-
SSDEEP
12:VtGSGK4d//UHwGlIFWVd2UROmDvLCoFZaF90exkJemNY2GulBM5B:VtGStCOlhF9DvLzkP0LVbG1B
Malware Config
Extracted
metasploit
windows/reverse_nonx_tcp
41.200.64.139:4444
Signatures
-
Metasploit family
Files
-
af47c89565c5b066943b583c4f8210345faca97bf1e41e7d581d41f98c85245f.exe windows x86
f9ade0aa18f660a34a4fa23392e21838
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 1B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 256B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 83B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ