General
-
Target
scenario2-traffic-capture.pcap
-
Size
4.6MB
-
Sample
230313-qw96sscf4y
-
MD5
8b49c76c8f758b394ebe94a242617da9
-
SHA1
0a505192a952f17259cb5bdbd595e6ce0c4a63fa
-
SHA256
1fe44854416989533fde54848fdb764afb5c4e08ec25d8da4b26f003de1385a6
-
SHA512
f4f1cd8a4110957fb11a9d850c43b426f81f6f501d339f7dfadcb37f778e718212407d42b3a50772f3fd0ae13acba0f4e8849c0278181de7941181efb6e21aec
-
SSDEEP
49152:nBC1E8vBbZmUVTl3qGJdrLlWq2d+hhwbioE4nlXCAR6fHJsxMLzbkNlWwQR5k4kh:KZNZBH+o8NYk/YrUZMYN2Gd
Behavioral task
behavioral1
Sample
scenario2-traffic-capture.pcap
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
scenario2-traffic-capture.pcap
Resource
win10v2004-20230220-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
192.168.220.66:4444
Targets
-
-
Target
scenario2-traffic-capture.pcap
-
Size
4.6MB
-
MD5
8b49c76c8f758b394ebe94a242617da9
-
SHA1
0a505192a952f17259cb5bdbd595e6ce0c4a63fa
-
SHA256
1fe44854416989533fde54848fdb764afb5c4e08ec25d8da4b26f003de1385a6
-
SHA512
f4f1cd8a4110957fb11a9d850c43b426f81f6f501d339f7dfadcb37f778e718212407d42b3a50772f3fd0ae13acba0f4e8849c0278181de7941181efb6e21aec
-
SSDEEP
49152:nBC1E8vBbZmUVTl3qGJdrLlWq2d+hhwbioE4nlXCAR6fHJsxMLzbkNlWwQR5k4kh:KZNZBH+o8NYk/YrUZMYN2Gd
Score3/10 -