General

  • Target

    1b2fbfe2bb4b3291afa6e7446d1e84438298099e2e408d953e17e498d4b4e698

  • Size

    4.4MB

  • MD5

    250d942111ebe36104083592caf72f07

  • SHA1

    ecf5dace484c3297b7121d3bd0ed39ebd735d9e0

  • SHA256

    1b2fbfe2bb4b3291afa6e7446d1e84438298099e2e408d953e17e498d4b4e698

  • SHA512

    903ae7c0460324924ce75b6abbfeafc5c4546315a31a3f57c5adc6db357855806041e7f25df5a6a6027d36cd9fb053fdd17e1cff30cca1e99ca120e737bcda1b

  • SSDEEP

    98304:tn3HMR9aXWv4BzQGb5L1P7XQjM5b7468YDpzVoR6:t3Y9amv4B9L1TXhb0Kv46

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.31.224:9001

Signatures

  • Metasploit family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 1b2fbfe2bb4b3291afa6e7446d1e84438298099e2e408d953e17e498d4b4e698
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections