General

  • Target

    e00f637acb6673598f53182cfe630e78fbdbcd97b7d27745b2708f9354dd6b09

  • Size

    205KB

  • MD5

    3669db5641a6890cc04faf21563dd0b5

  • SHA1

    977ed45c74b762b565ea8a658877e6ab2978aca9

  • SHA256

    e00f637acb6673598f53182cfe630e78fbdbcd97b7d27745b2708f9354dd6b09

  • SHA512

    3e954d2621117463aed4326cf680df43f990f4a09d7655d7abdb9f170e0102fc0a984db9d80289f37d4f849896d98978d33bebd9cb27d1b32003802aa310f2d5

  • SSDEEP

    6144:MgQPSwjv9cL1PLeG3QCpfwXL6Zrx8ZyeX/TwTxm+/b:Zwjv9cLAkQCpfYsGZyS/TG

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.1.200:443

Signatures

  • Metasploit family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • e00f637acb6673598f53182cfe630e78fbdbcd97b7d27745b2708f9354dd6b09
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections