General

  • Target

    aka.exe

  • Size

    72KB

  • MD5

    ab1da11f547b2be848be15788f8995ca

  • SHA1

    e9095be30f6549c978b224b3ee3baf1b1a0192be

  • SHA256

    529f6e3d4fad855bd5eb07d280931f01f2dd5ff2b5c14381a55aa406a61cb67d

  • SHA512

    b5c034d0431bbbe17e99c5948546c0cd1d1abccb9486460f01b2802357b73cb9899106a23a29812a325d69c435f2f7e3ba0d3419a3e3a840abce85ee6a17778c

  • SSDEEP

    1536:I5YvRclwWzsx/LuD5alNt5KzecZycMb+KR0Nc8QsJq39:jvRqsialfs7e0Nc8QsC9

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.1.209:4444

Signatures

  • Metasploit family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • aka.exe
    .exe windows x86

    481f47bbb2c9c21e108d65f52b04c448


    Headers

    Imports

    Sections