General

  • Target

    kiki.exe

  • Size

    72KB

  • MD5

    a99f3b501d87f7e5ff90b97f1f4a820f

  • SHA1

    5db5c4aac55db25894eae9f3ddba7a2a582459b3

  • SHA256

    a30e13548b7ec9c749cc9ce33351f0b701b4f922f303bd6679958ed791a7b927

  • SHA512

    b1f0a17126ba765aa417edf031a5f7f1e1958ab133a8e47a9e2039245578e1d44c9c4a2ea1b119802dd99007233fb49bb3cf2367a0a825850dc9050c7bc2e1cc

  • SSDEEP

    1536:IRduIzhHnT8LedCMWnbh56FtVMb+KR0Nc8QsJq39:U4+HnTbdC1DCPe0Nc8QsC9

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

10.10.79.149:9666

Signatures

  • Metasploit family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • kiki.exe
    .exe windows:4 windows x86 arch:x86

    481f47bbb2c9c21e108d65f52b04c448


    Headers

    Imports

    Sections