General

  • Target

    windows-meterpreter-staged-reverse-tcp-4444.exe

  • Size

    72KB

  • MD5

    fcc6d895e017721a0890dde723d1b67d

  • SHA1

    8b44ce3287d11d6b944e57584a2d1ac3b346680d

  • SHA256

    702286734d972ae7434ff0674b4bbbc0897532ed57a9a249220bba76be07d652

  • SHA512

    84636c97912b71a4af649360a005c340687380f1234acf2bc9d8ea6b53f10ce064dd536b16e413715754fdbf1adac84b10987a831959d08f1735d4c577fc6e9b

  • SSDEEP

    1536:InqE+hzU4SD9c4TxsO+ekttzfmlbAFFF3Mb+KR0Nc8QsJq39:6B+apFA0lU3F3e0Nc8QsC9

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

28.0.2.82:4444

Signatures

Files

  • windows-meterpreter-staged-reverse-tcp-4444.exe
    .exe windows x86

    481f47bbb2c9c21e108d65f52b04c448


    Headers

    Imports

    Sections