General

  • Target

    payload.exe

  • Size

    72KB

  • MD5

    59b7a770f73d9b244c8bb6d2bd2aca58

  • SHA1

    fb04f7150b10ca63864e11d901f6581e01ad0081

  • SHA256

    8d4f5aaa90c66a1a878b5b2d801aafafb7d2028190cea8f67c6dea762f046739

  • SHA512

    ecca4009c3f438dc8d14eeee793b663ad6dfade43e1250dfb9f386d0f40ad882f591b307a648db952fa1fbe22d9fc6d1751eb29f7773ed4f37c00d12f3d7759e

  • SSDEEP

    1536:I//hqZHVHfN8+OgM5tV0FUaIYksYWMb+KR0Nc8QsJq39:o/hqZ1HlHPMfV0FC1Ye0Nc8QsC9

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

20.171.26.181:8080

Signatures

  • Metasploit family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • payload.exe
    .exe windows:4 windows x86 arch:x86

    481f47bbb2c9c21e108d65f52b04c448


    Headers

    Imports

    Sections