Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
General
-
Target
tmp
-
Size
203KB
-
MD5
a2d5f03d0d5fe5263fd83e96c47b0fa9
-
SHA1
33bf9463feb04fbae355a79f50ff37cfc10f4fb4
-
SHA256
c3c939fd0e072fa5696189ce1dbe9df6ddebb710a07ef17beb11b6b4ac9274e5
-
SHA512
fb1a42c5acd86566316a0d3eb25c190e6991d341333b4c718d3ae057c09b9278418eae422608b1760c95aa5a993a5038118761ac629e3f24b807554133a9f70b
-
SSDEEP
6144:PA7gvTzNbJkCCJVJKk/6OztpO74F8AeK:o7EVJkCcrzQBAz
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
Metasploit family
Files
-
tmp.exe windows x64
b4c6fff030479aa3b12625be67bf4914
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
VirtualAlloc
ExitProcess
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 132B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ejbg Size: 197KB - Virtual size: 196KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE