General

  • Target

    Exploit.rar

  • Size

    5.3MB

  • MD5

    a9b909da463ac6470b13817fb89146f2

  • SHA1

    06a7f8065e7200bd371983836c7ab5246445a588

  • SHA256

    420b85424b17ec3e5c5c2c8ce26786595c8fdf8cdaff4a5e04693eb7cbbcef0d

  • SHA512

    9683046f8f0e7f7fcd42b09481bc0e7cf4bf2430db27ab3d2fc02e444633b423edc80f692bdcaa977f5e2c9ac178d5ca5a5b59a25bee2cc049f4efea2385debc

  • SSDEEP

    98304:ygUPU70dXLao5ePAvDygm3JfoWD8z7NjIZtMkH/GumFjtZO2tDSCDi+1P3m5ypy:OA0dWokPQygmw7mZtMNuwjtw8m5yo

Score
1/10

Malware Config

Signatures

Files

  • Exploit.rar
    .rar
  • config.yml
  • datalog/EzExploitSpoken.jar
    .jar
  • datalog/ProxyBridge.jar
    .zip
  • bungee.yml
  • jutting/BungeeHack.class
  • jutting/commands/ConnectCommand.class
  • jutting/commands/IPCommand.class
  • jutting/commands/InfoCommand.class
  • jutting/commands/NameCommand.class
  • jutting/commands/UUIDCommand.class
  • jutting/listener/LoginListener.class
  • jutting/listener/PreLoginListener.class
  • jutting/listener/ServerConnectListener.class
  • org/json/simple/ItemList.class
  • org/json/simple/JSONArray.class
  • org/json/simple/JSONAware.class
  • org/json/simple/JSONObject.class
  • org/json/simple/JSONStreamAware.class
  • org/json/simple/JSONValue.class
  • org/json/simple/parser/ContainerFactory.class
  • org/json/simple/parser/ContentHandler.class
  • org/json/simple/parser/JSONParser.class
  • org/json/simple/parser/ParseException.class
  • org/json/simple/parser/Yylex.class
  • org/json/simple/parser/Yytoken.class
  • ezexploit.jar
    .jar
  • modules.yml
  • modules/cmd_alert.jar
    .jar
  • modules/cmd_find.jar
    .jar
  • modules/cmd_list.jar
    .jar
  • modules/cmd_send.jar
    .jar
  • modules/cmd_server.jar
    .jar
  • modules/reconnect_yaml.jar
    .jar
  • proxy.log.0
  • start.bat