General

  • Target

    0d84491f3dd094ed40e8955c66815ba7b22f30d96775071ec7c9c16aeea85ad0

  • Size

    4.4MB

  • MD5

    32fc7c52730729c2f7ea9aeda3b14937

  • SHA1

    d0ce3cae6c1738c10869af24986575e01e56c727

  • SHA256

    0d84491f3dd094ed40e8955c66815ba7b22f30d96775071ec7c9c16aeea85ad0

  • SHA512

    a1c5f4005d46580e6d098f0aac88de13864a9df7b4cf00d0e0ed11d388940deef3bb6e387926c757d9f83863dcdd5d264795e462244bc572a649779a7c9be6fc

  • SSDEEP

    98304:jn3HMR9aXWv4BzQGb5L1P7XQjM5b7468YDpzVoR6:j3Y9amv4B9L1TXhb0Kv46

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.145.129:9999

Signatures

  • Metasploit family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 0d84491f3dd094ed40e8955c66815ba7b22f30d96775071ec7c9c16aeea85ad0
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections