General

  • Target

    60f5cd13aded7ae82380e20ed4132d463352afd7808d0e59bdf7577473406500.zip

  • Size

    44KB

  • MD5

    552fbedc7b61b86016856663cc91179d

  • SHA1

    aec8eb4218f5c423db961d4b24c91a2ce869bf3b

  • SHA256

    f706d0d2a34aa237b5909f160e88c2893f79e7f272a30435a0eba7eb60c7589b

  • SHA512

    bf006cce60d01e301e3905221fae4c352eae64336f790f0202c0602a728e5a4769962dc1c398f455ac34fb4bd2df39da407ae401ac8b408464e5d912a83aedda

  • SSDEEP

    768:28IcKLzz/NYupgGoqYU5442f6ALHZg2YiSny1L2O106foFBq:2P/NYupgvC442PZJeeaO1J08

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

142.1.27.146:4444

Signatures

  • Metasploit family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 60f5cd13aded7ae82380e20ed4132d463352afd7808d0e59bdf7577473406500.zip
    .zip

    Password: infected

  • 60f5cd13aded7ae82380e20ed4132d463352afd7808d0e59bdf7577473406500
    .exe windows x86

    Password: infected

    481f47bbb2c9c21e108d65f52b04c448


    Headers

    Imports

    Sections