Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Behavioral task
behavioral1
Sample
ecf95c18be56232d087213191dc8e0713aaff7c29dcf49c8129f0bc33627f568.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ecf95c18be56232d087213191dc8e0713aaff7c29dcf49c8129f0bc33627f568.exe
Resource
win10v2004-20220812-en
Target
ecf95c18be56232d087213191dc8e0713aaff7c29dcf49c8129f0bc33627f568
Size
13KB
MD5
bcb220a65118b99afc43f4090c447aad
SHA1
4b859fbe0a60ab795ef6a41bc20b14d7932bb96f
SHA256
ecf95c18be56232d087213191dc8e0713aaff7c29dcf49c8129f0bc33627f568
SHA512
acd4400af6ef03b7dea9b2ccf3f251ebeec92c2a62cda504fa7e72ef1cbc1bb6ea035c7d80304c57842ee26024bb1cdc2e62a84741be9103b9fc3e67aa69fa9a
SSDEEP
48:qIDszp+pkRhnUxpnit2Vww2yduVdkVrmbZQynit2YimFDx+lYqzigqVPS/W4Bqbj:pa24UDmBVNZ5xmFDxCkFWBqb5zG69l
metasploit
encoder/shikata_ga_nai
metasploit
windows/shell_reverse_tcp
192.168.187.134:4444
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ReadFile
SetFilePointer
VirtualAlloc
CreateFileA
GetModuleFileNameA
CloseHandle
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ