General

  • Target

    kys.exe

  • Size

    72KB

  • MD5

    316cab02f6c9522e9a6bd8e880bdfa3f

  • SHA1

    51d6299aab89934faf78c6bb3bd1b5d8d89d1592

  • SHA256

    1d47fb6c9349ec6e3486ced4b6eb1cac5241b51355812413895b4b2d5eaa7350

  • SHA512

    64f16495a41a31e4baf6665f6adaf05adfc2b3dae4aa49c8e8b0cf9622becbc379cab26b11c03321c2e2589bbd6ec33116afce935a9306fb9c13b8e70c2c9e78

  • SSDEEP

    1536:INqrK0hyorUjqbMwFYm+k/XoqnAof+uPXpkMb+KR0Nc8QsJq39:RhngjXwFn3vNp+Wee0Nc8QsC9

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.174.141:4444

Signatures

  • Metasploit family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • kys.exe
    .exe windows:4 windows x86 arch:x86

    481f47bbb2c9c21e108d65f52b04c448


    Headers

    Imports

    Sections