Behavioral task
behavioral1
Sample
wxy.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
wxy.exe
Resource
win10v2004-20220812-en
General
-
Target
wxy.exe
-
Size
7KB
-
MD5
1c8dacd821eb128575725de8ee521aaa
-
SHA1
c493c80a35178811e67fd5ee7b2468853f01d4d2
-
SHA256
4df20e1029b4b0dde3f4edd921ec017b4edc5f6b9a0d4317311fdfd5c11f02cc
-
SHA512
4f1272bfcf7a2440650fb9fc3b7f1cc415d1ffb999306fd207b75237ba5e294520926e449d7acdefc31bcc793c7850cbf115b394854c250ea55b32a9762676a6
-
SSDEEP
24:eFGStrJ9u0/6z0nZdkBQAVAWY+hKtRq4eNDMSCvOXpmB:is0aYkBQj+hK5SD9C2kB
Malware Config
Extracted
metasploit
metasploit_stager
135.148.97.180:8993
Signatures
-
Metasploit family
Files
-
wxy.exe.exe windows x64
b4c6fff030479aa3b12625be67bf4914
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
VirtualAlloc
ExitProcess
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 132B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fwqk Size: 1024B - Virtual size: 632B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE