General

  • Target

    rs_exploitl.exe

  • Size

    72KB

  • MD5

    6b0dfcd11abd60ed185c2a8870f7e3ff

  • SHA1

    2012ffb91b2837b4df6622e6096389fde1fc080f

  • SHA256

    905d589730a2a9ef77e0e2157d5749c9af79f422138daba6103cad7bc832614d

  • SHA512

    a016ac674eab856c872f55de26d036b8f1d913374cfdba61f9bd6d439a1e2d8ee14a1dfc6db1db3982d822f2682417eb9e1d64e55e0a22a7b16b0c46e6bb0a7d

  • SSDEEP

    1536:I5Cc2Pvc7fUihs593PlT32f3Mb+KR0Nc8QsJq39:WCbP4ZhsjflTmf3e0Nc8QsC9

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

147.182.192.25:4444

Signatures

  • Metasploit family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • rs_exploitl.exe
    .exe windows:4 windows x86 arch:x86

    481f47bbb2c9c21e108d65f52b04c448


    Headers

    Imports

    Sections