General

  • Target

    d0e236ae04146ae16bad95c3a39bdfb3dbffc28f0d46a0fcf4e8f6cf3dea8199

  • Size

    41KB

  • MD5

    d6b6b6d2d8b9cde48da57e83b3cb1672

  • SHA1

    36a716248d65e7bce3d5d1543f7fb0e8468ae6d9

  • SHA256

    d0e236ae04146ae16bad95c3a39bdfb3dbffc28f0d46a0fcf4e8f6cf3dea8199

  • SHA512

    5b72a125772925d701a2ee02763fdc9be366a19a8bb1879c8d2f962b4a3fd3d252fd0656a9698f6263a4161480a05d0472fe086221f9f706722545df238e1e89

  • SSDEEP

    768:j19oagrkdFkyZ6bKKCv9PYpDVugu9vuDIu:jD/grkdF+b1CvRYpD2/

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.16.130:3333

Signatures

  • Metasploit family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • d0e236ae04146ae16bad95c3a39bdfb3dbffc28f0d46a0fcf4e8f6cf3dea8199
    .exe windows:6 windows x86

    fe5fdfada7746b09c892da30eaab4f7a


    Headers

    Imports

    Sections