Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Behavioral task
behavioral1
Sample
8fb5bed8cc52319d4cdcaa416f8655bb37886d2e56a31489c97e993012d18a93.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8fb5bed8cc52319d4cdcaa416f8655bb37886d2e56a31489c97e993012d18a93.exe
Resource
win10v2004-20220901-en
Target
8fb5bed8cc52319d4cdcaa416f8655bb37886d2e56a31489c97e993012d18a93
Size
13KB
MD5
aad20561fa106f512e0e8d962cbb7a55
SHA1
0e61893f12e081f9e4d4862b64f15d9d6b4f99ef
SHA256
8fb5bed8cc52319d4cdcaa416f8655bb37886d2e56a31489c97e993012d18a93
SHA512
192732f563a1da2352ec1053c377bdb7ba51f52110776934a9e039348c220ff0aeb43bdc01d00d06b1fa6b88b11698aaee4b18a3178668eff19fe28db2601118
SSDEEP
48:qIDszp+pkRhnUxpnit2Vww2yduVdkVrmbZQynit2YimFDx+lYqzigqVPS/W4Bqbb:pa24UDmBVNZ5xmFDxCkFWBqb5zG67
metasploit
encoder/shikata_ga_nai
metasploit
windows/shell_reverse_tcp
192.168.0.5:4444
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ReadFile
SetFilePointer
VirtualAlloc
CreateFileA
GetModuleFileNameA
CloseHandle
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ