General

  • Target

    67db74d403deee90a921ad623f10b2d2f3dd248cb68d1faba8cf906d27a40d0e

  • Size

    99KB

  • MD5

    f9142ef364e5b856ef2e40bb58b61314

  • SHA1

    be40f0f05a974c5beebcc7f5b1b907a15e48a2f3

  • SHA256

    67db74d403deee90a921ad623f10b2d2f3dd248cb68d1faba8cf906d27a40d0e

  • SHA512

    a423a7141d8c00d8567c4ccb92233b85af8ef32c2a989e119b80da41334c570cd2a74776cb7dfa361e07dc64468e26fd54dcac312a5ababdb80ef276c1c3348c

  • SSDEEP

    3072:6u4MP+8PGGSp7OoWT7SlxFPUvj86k8TEoKB4dQnr:PPjSJxBUvvk8TldSr

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.230.129:4444

Signatures

  • Metasploit family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 67db74d403deee90a921ad623f10b2d2f3dd248cb68d1faba8cf906d27a40d0e
    .exe windows:4 windows x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86


    Headers

    Sections