General

  • Target

    windows-meterpreter-staged-reverse-tcp-1234.exe

  • Size

    72KB

  • MD5

    b11799c47dca5f0cbe049fbfa33cdcca

  • SHA1

    b921c2365c121f070dc89ad0f67aea18cf1de45b

  • SHA256

    4ae55ddc9287e5dc704f0e8fb533859c0d2c23f9c13fbd5a331fc115cd054c61

  • SHA512

    78c81e5ee78f54a2cb57dd84463bd059804af0297bb55a88ccb1b8de388ed9a964dfcc0cfb342c33096c78f403db7019c0137d2a57c1922a7a06e23221754682

  • SSDEEP

    1536:Irtjerr13l5cbzNm3ch3IuHzC9oAiqcG3Mb+KR0Nc8QsJq39:nZ3l5ypm35ozcBcG3e0Nc8QsC9

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

28.0.4.29:1234

Signatures

Files

  • windows-meterpreter-staged-reverse-tcp-1234.exe
    .exe windows x86

    481f47bbb2c9c21e108d65f52b04c448


    Headers

    Imports

    Sections