Resubmissions
21/12/2023, 20:31
231221-za5hvsedc3 10General
-
Target
003d7e808996d3b1cbe2e7b0d73aea81
-
Size
3.6MB
-
MD5
003d7e808996d3b1cbe2e7b0d73aea81
-
SHA1
1fbe42e674403661f458ec15eb850eea995fa619
-
SHA256
9d8271749fe043f4a393458c0b808309224be70cddb57baa724da2ea0d0181be
-
SHA512
50577a8144178fd3094ebe921997914a43ead2e96f0065c313ce20a39795f4410fb4feb4b4dc83559ce948a74cb3a6595b011adc85db79a4cb8d8deb04a099f8
-
SSDEEP
49152:LdQxkmA1bRgPYS/BEg8v4UASQft/MEeCQ4JvJC0ImZ9UIm3D04/aacyi7vlp:511MYSWg8vVA4EFjuzn/JcR7
Malware Config
Signatures
-
Metasploit family
-
Unsigned PE 4 IoCs
Checks for missing Authenticode signature.
resource unpack002/test.exe unpack002/testdll.dll unpack003/FakeSandBox.sys unpack003/test.exe
Files
-
003d7e808996d3b1cbe2e7b0d73aea81.tar
-
0701-exploits/212cafeboard-xss.txt
-
0701-exploits/BTP00002P001SK.zip.zip
-
readme.txt
-
test.c
-
test.exe.exe windows:4 windows x86 arch:x86
096b15e98d6ab3fb61c9d94c39710061
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
crtdll
__GetMainArgs
_cexit
_environ_dll
_fmode_dll
_fpreset
_iob
_onexit
_setmode
atexit
fprintf
printf
puts
signal
kernel32
CopyFileA
ExitProcess
FormatMessageA
GetLastError
LocalFree
SetUnhandledExceptionFilter
msvcrt
_vsnprintf
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 96B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 692B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
testdll.c
-
testdll.def
-
testdll.dll.dll windows:4 windows x86 arch:x86
d7234b7aa375267fee7c501269bbef22
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
Imports
kernel32
AddAtomA
CloseHandle
CreateFileA
CreateThread
DisableThreadLibraryCalls
FindAtomA
GetAtomNameA
GetCurrentProcessId
SetFilePointer
Sleep
TerminateThread
WriteFile
msvcrt
__dllonexit
_errno
_iob
_vsnprintf
abort
fflush
fprintf
free
malloc
strlen
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 464B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 700B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 240B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
0701-exploits/BTP00003P004AO.zip.zip
-
FakeSandBox.sys.sys windows:4 windows x86 arch:x86
94947d69e9cee0d646d6271c2b6a0ce9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwOpenSection
RtlNtStatusToDosErrorNoTeb
ZwCreateFile
ZwOpenFile
ZwClose
ZwWaitForSingleObject
ZwSetEvent
ZwQueryDirectoryFile
ZwSetInformationFile
ZwDeleteFile
ZwMakeTemporaryObject
ZwCreateSymbolicLinkObject
ZwOpenKey
ZwCreateKey
ZwDeleteKey
ZwQueryKey
ZwQueryValueKey
ZwSetValueKey
ZwReplaceKey
ZwSaveKey
ZwDeleteValueKey
ZwLoadDriver
ZwUnloadDriver
ZwOpenProcess
ZwTerminateProcess
NtBuildNumber
KeDelayExecutionThread
SeCreateClientSecurity
KeGetCurrentThread
ObfDereferenceObject
SeTokenType
IoDeleteDevice
InterlockedCompareExchange
IofCompleteRequest
IoRegisterShutdownNotification
IoCreateUnprotectedSymbolicLink
IoCreateDevice
RtlInitUnicodeString
InterlockedExchangeAdd
_strnicmp
KeClearEvent
KeWaitForSingleObject
KeSetEvent
KeInitializeEvent
KeQuerySystemTime
ObQueryNameString
KeDetachProcess
ObReferenceObjectByHandle
MmSectionObjectType
KeAttachProcess
IoGetCurrentProcess
MmIsAddressValid
ExGetPreviousMode
PsLookupProcessByProcessId
PsLookupProcessThreadByCid
IoThreadToProcess
RtlAnsiStringToUnicodeString
RtlUnicodeStringToAnsiString
RtlUpcaseUnicodeString
_wcsnicmp
wcschr
ZwQuerySymbolicLinkObject
ZwOpenSymbolicLinkObject
IoCreateFile
IoFileObjectType
IofCallDriver
IoAllocateIrp
IoGetRelatedDeviceObject
IoFreeIrp
IoFreeMdl
MmUnlockPages
MmUnmapLockedPages
MmMapLockedPages
IoSetInformation
IoQueryFileInformation
_allmul
_aulldiv
ZwQuerySystemInformation
_stricmp
RtlImageNtHeader
strncpy
ZwUnmapViewOfSection
ZwMapViewOfSection
wcslen
KeServiceDescriptorTable
MmCreateSection
MmMapViewOfSection
MmUnmapViewOfSection
MmUnmapViewInSystemSpace
KeNumberProcessors
PsGetVersion
RtlQueryRegistryValues
ExFreePool
RtlAppendUnicodeToString
RtlCopyUnicodeString
ExAllocatePoolWithTag
_snwprintf
RtlTimeToTimeFields
ExSystemTimeToLocalTime
ZwQueryInformationFile
MmUnmapIoSpace
RtlEnlargedIntegerMultiply
ZwReadFile
DbgPrint
RtlUnwind
InterlockedIncrement
InterlockedDecrement
NtQueryInformationProcess
ZwCreateSection
hal
KeQueryPerformanceCounter
KeGetCurrentIrql
HalMakeBeep
Sections
.text Size: 206KB - Virtual size: 206KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 960B - Virtual size: 952B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
readme.txt
-
test.c
-
test.exe.exe windows:4 windows x86 arch:x86
08c377f7944c05762eca4271351c5941
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
crtdll
__GetMainArgs
_cexit
_environ_dll
_fmode_dll
_fpreset
_iob
_onexit
_setmode
atexit
fprintf
free
fwrite
malloc
printf
puts
signal
wcsncpy
kernel32
CloseHandle
CreateFileA
ExitProcess
FormatMessageA
GetLastError
LocalFree
SetUnhandledExceptionFilter
msvcrt
_vsnprintf
_vsnwprintf
ntdll
RtlDosPathNameToNtPathName_U
ZwSetInformationFile
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 592B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 96B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 972B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
0701-exploits/JvmGifVulPoc.java.txt
-
0701-exploits/LS-20061102.rar.rar
-
CrystalReportsModified.rpt
-
CrystalReportsOriginal.rpt
-
0701-exploits/MA-23-06-2006.txt
-
0701-exploits/MOAB-01-01-2007.rb.txt
-
0701-exploits/MOAB-03-01-2007.rb.txt.sh .vbs linux polyglot
-
0701-exploits/MOAB-04-01-2007.rb.txt.sh linux
-
0701-exploits/MOAB-05-01-2007.rb.txt.sh linux
-
0701-exploits/MOAB-05-01-2007_cron.rb.txt.sh linux
-
0701-exploits/MOAB-06-01-2007.pdf.pdf
-
0701-exploits/MOAB-07-01-2007.html.html .js polyglot
-
0701-exploits/MOAB-09-01-2007.dmg
-
0701-exploits/MOAB-09-01-2007.rb.txt.sh linux
-
0701-exploits/MOAB-10-01-2007.dmg.gz.gz
-
MOAB-10-01-2007.dmg
-
0701-exploits/MOAB-11-01-2007.dmg.gz.gz
-
MOAB-11-01-2007.dmg
-
0701-exploits/MOAB-12-01-2007.dmg.gz.gz
-
MOAB-12-01-2007.dmg
-
0701-exploits/MOAB-13-01-2007.dmg.gz.gz
-
MOAB-13-01-2007.dmg
-
0701-exploits/MOAB-14-01-2007.c
-
0701-exploits/MOAB-15-01-2007.rb.txt
-
0701-exploits/MOAB-16-01-2007.rb.txt.sh .ps1 linux polyglot
-
0701-exploits/MOAB-17-01-2007.rb.txt.sh linux
-
0701-exploits/MOAB-18-01-2007.rb.txt.sh linux
-
0701-exploits/MOAB-19-01-2007.tgz.gz
-
0701-exploits/MOAB-20-01-2007.tgz.gz
-
0701-exploits/MOAB-21-01-2007.rb.txt.sh linux
-
0701-exploits/MOAB-22-01-2007.rb.txt.sh linux
-
0701-exploits/MOAB-23-01-2007.pct
-
0701-exploits/MOAB-25-01-2007.c
-
0701-exploits/MOAB-25-01-2007.rb.txt.sh linux
-
0701-exploits/MOAB-27-01-2007.tgz.gz
-
0701-exploits/MOAB-28-01-2007.rb.txt.sh linux
-
0701-exploits/MOAB-29-01-2007.rb.txt.sh linux
-
0701-exploits/MsgEng.py.txt.sh linux
-
0701-exploits/PR06-14.txt
-
0701-exploits/Universal_printer_provider_exploit.zip.zip
-
0701-exploits/VLCMediaSlayer-ppc.pl.txt.sh linux
-
0701-exploits/VLCMediaSlayer-x86.pl.txt.sh linux
-
0701-exploits/admentor-sql.txt
-
0701-exploits/adobeplugin.txt
-
0701-exploits/adv62-y3dips-2007.txt
-
0701-exploits/aiocp-bypass.txt
-
0701-exploits/aiocp-sql.txt
-
0701-exploits/ajlogin35-mdb.txt
-
0701-exploits/arcserve.py.txt.sh .js linux polyglot
-
0701-exploits/arsdigita-traverse.txt
-
0701-exploits/ashopcom-xss.txt
-
0701-exploits/aspbb.txt
-
0701-exploits/aspedge12b-sql.txt
-
0701-exploits/aspnews3-sql.txt
-
0701-exploits/avm-traversal.txt
-
0701-exploits/aztek41-sploit.txt.sh linux
-
0701-exploits/battleblog-db.txt
-
0701-exploits/bbclone-rfi.txt
-
0701-exploits/berlios.meta.txt
-
0701-exploits/bitweaver-xss.txt
-
0701-exploits/cacti086i-remote.txt
-
0701-exploits/cacti1-086i.txt
-
0701-exploits/camouflage-crack.txt
-
0701-exploits/carbon-db.txt
-
0701-exploits/cascadianfaq-sql.txt
-
0701-exploits/checkpoint-bypass.txt
-
0701-exploits/cmsimple27-rfi.txt
-
0701-exploits/cmsms102-xss.txt
-
0701-exploits/cnt-exploit.txt
-
0701-exploits/coppermine-php.txt.sh linux
-
0701-exploits/createauction-rfi.txt
-
0701-exploits/createauction-sql.txt
-
0701-exploits/critical_openbsd_communism.c
-
0701-exploits/cscart133-rfi.txt
-
0701-exploits/da-adv-01202007.txt
-
0701-exploits/dayfox-rfi.txt
-
0701-exploits/devc4992.py.txt.sh linux
-
0701-exploits/digi-sql.txt.sh linux
-
0701-exploits/ebp2x-rfi.txt
-
0701-exploits/edittag12-xss.txt
-
0701-exploits/editx-rfi.txt
-
0701-exploits/eiq-dos.txt
-
0701-exploits/ememberspro10-mdb.txt
-
0701-exploits/enigma-rfi.txt
-
0701-exploits/enigmawp-rfi.txt
-
0701-exploits/exploit-of-the-apes.rb.txt
-
0701-exploits/ezboxxezroot.txt
-
0701-exploits/fcCMS10-xss.txt
-
0701-exploits/filecopa.meta.txt
-
0701-exploits/fishcart-sql.txt
-
0701-exploits/flog112-disclose.txt
-
0701-exploits/formbank19-traverse.txt
-
0701-exploits/freeforum090-rfi.txt
-
0701-exploits/galeria-lfi.txt.sh linux
-
0701-exploits/gallery-rfi.txt
-
0701-exploits/gb03-db.txt
-
0701-exploits/gb400-xss.txt
-
0701-exploits/geobb-rfi.txt
-
0701-exploits/gmx-xss.txt.js
-
0701-exploits/googlePwned.txt
-
0701-exploits/gps12-sql.txt
-
0701-exploits/guest402.txt.sh linux
-
0701-exploits/harika20-mdb.txt
-
0701-exploits/hpj-x01.cpp
-
0701-exploits/igcal10-sql.txt
-
0701-exploits/igshop10-multiple.txt
-
0701-exploits/index.html.html
-
0701-exploits/index2.html.html
-
0701-exploits/index3.html.html
-
0701-exploits/index4.html.html
-
0701-exploits/index5.html.html
-
0701-exploits/index6.html.html
-
0701-exploits/index7.html.html
-
0701-exploits/index8.html.html
-
0701-exploits/indexdate.html.html
-
0701-exploits/indexdate2.html.html
-
0701-exploits/indexdate3.html.html
-
0701-exploits/indexdate4.html.html
-
0701-exploits/indexdate5.html.html
-
0701-exploits/indexdate6.html.html
-
0701-exploits/indexdate7.html.html
-
0701-exploits/indexdate8.html.html
-
0701-exploits/indexsize.html.html
-
0701-exploits/indexsize2.html.html
-
0701-exploits/indexsize3.html.html
-
0701-exploits/indexsize4.html.html
-
0701-exploits/indexsize5.html.html
-
0701-exploits/indexsize6.html.html
-
0701-exploits/indexsize7.html.html
-
0701-exploits/indexsize8.html.html
-
0701-exploits/indexu-xss.txt
-
0701-exploits/instant-xss.txt
-
0701-exploits/intel-dos.txt
-
0701-exploits/intel-pwn.c
-
0701-exploits/ios-mdb.txt
-
0701-exploits/jax-rfi.txt
-
0701-exploits/jshop13-rfi.txt
-
0701-exploits/kav60-escalate.txt
-
0701-exploits/kgb19-lfi.txt
-
0701-exploits/kolayindir-sql.txt
-
0701-exploits/lcs11-rfi.txt
-
0701-exploits/lmmhi-xss.txt
-
0701-exploits/lunar-rfi.txt
-
0701-exploits/makit-sql.txt
-
0701-exploits/mcore-mdb.txt
-
0701-exploits/mdpro-sql.txt
-
0701-exploits/mercur-imap.txt.sh linux
-
0701-exploits/microcms35.txt.sh linux
-
0701-exploits/mint-sql.txt
-
0701-exploits/mitisoft-mdb.txt
-
0701-exploits/mkportalfun.txt
-
0701-exploits/mpsw-rfi.txt
-
0701-exploits/ms07-004.txt
-
0701-exploits/mssploit.txt
-
0701-exploits/mybloggie215-xss.txt
-
0701-exploits/mynews-rfi.txt
-
0701-exploits/naig052-rfi.txt
-
0701-exploits/navicopa.meta.txt
-
0701-exploits/netvigilance-sa10.txt
-
0701-exploits/nukedklan17.txt
-
0701-exploits/nunenews-rfi.txt
-
0701-exploits/nwomtopsites30-sql.txt.js
-
0701-exploits/okul-sql.txt
-
0701-exploits/oohasp-mdb.txt
-
0701-exploits/openforum.txt
-
0701-exploits/openmedia.txt
-
0701-exploits/openpinboard-rfi.txt
-
0701-exploits/oracle--isa-xss.txt
-
0701-exploits/oracle10g-1.txt
-
0701-exploits/oracle10g-2.txt
-
0701-exploits/oracle10g-3.txt
-
0701-exploits/ovidentia-rfi.txt
-
0701-exploits/paypal-inject.txt
-
0701-exploits/pdf-xss.txt.js
-
0701-exploits/phpbb2-rfi.txt
-
0701-exploits/phpfootball16-disclose.txt
-
0701-exploits/phpgenlib-rfi.txt
-
0701-exploits/phpircbot-rfi.txt
-
0701-exploits/phplinkdirectory_070121.txt
-
0701-exploits/phpmyadmin-xss.txt
-
0701-exploits/phpnuke79-sql.txt
-
0701-exploits/phpxd03-rfi.txt
-
0701-exploits/ppc-rfi.txt
-
0701-exploits/prdelka-vs-GNU-mbsebbs.c
-
0701-exploits/qksmtp.pl.txt.sh linux
-
0701-exploits/quicktime.py.txt.sh linux
-
0701-exploits/raise.c
-
0701-exploits/rapidkill.txt
-
0701-exploits/rblasp-sql.txt
-
0701-exploits/rblog-db.txt
-
0701-exploits/rediffbol.txt
-
0701-exploits/riblog-xss.txt
-
0701-exploits/rixstep_pwnage.c
-
0701-exploits/sabros17-xss.txt
-
0701-exploits/sami-dos.txt.sh linux
-
0701-exploits/sazcart-rfi.txt
-
0701-exploits/shopstorenow-sql.txt
-
0701-exploits/simplog0932.txt
-
0701-exploits/siteman-pass.txt
-
0701-exploits/siteman1111-disclose.txt
-
0701-exploits/smefilemailer-sql.txt
-
0701-exploits/snews1530.txt
-
0701-exploits/spooky-sql.txt
-
0701-exploits/stego-crack.txt
-
0701-exploits/swcms.php.txt.sh linux
-
0701-exploits/tftpdwin042.txt.sh linux
-
0701-exploits/tk53-advisory-1.txt
-
0701-exploits/tlm-rfi.txt
-
0701-exploits/tmvwall381v3_exp.c
-
0701-exploits/trevorchan07-rfi.txt
-
0701-exploits/uberupload.txt
-
0701-exploits/uguestbook-mdb.txt
-
0701-exploits/uniforum4-sql.txt
-
0701-exploits/uniqueads-sql.txt
-
0701-exploits/votepro40-exec.txt
-
0701-exploits/wcsimple-disclose.txt
-
0701-exploits/webulas-mdb.txt
-
0701-exploits/wine-db.txt
-
0701-exploits/wmfdos.txt.sh linux
-
0701-exploits/xero-rfi.txt
-
0701-exploits/yald10-xss.txt