General

  • Target

    dac676562d1d467c5d7e2fd6ac191bcab2da18d95a5f2012d1b4cc607a8e36d6

  • Size

    4.5MB

  • MD5

    8109c570b72e32174a28a61ae628567f

  • SHA1

    7adfbcfa4892568d899cdc0250a60d2fb6bd3945

  • SHA256

    dac676562d1d467c5d7e2fd6ac191bcab2da18d95a5f2012d1b4cc607a8e36d6

  • SHA512

    0091af71dd2e98c3746626a99829c8b49cc4701bd4607948c1de87123f6ed87ea893b607c5878768aa005d3c38d274372535c37832719ac5bcb9928a416d11a7

  • SSDEEP

    98304:rXr3ay/mq1BjDtkQ079UKTzY32d6xayyNzped9HziQTQwFYT:r7ay+q1HKUKcZxayyGd9HFkvT

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.49.128:3333

Signatures

  • Metasploit family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 5 IoCs

    Checks for missing Authenticode signature.

Files

  • dac676562d1d467c5d7e2fd6ac191bcab2da18d95a5f2012d1b4cc607a8e36d6
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • $PLUGINSDIR/InstallOptions.dll
    .dll windows:4 windows x86 arch:x86

    85f08eb0cbec010ecbc287fa68321173


    Headers

    Imports

    Exports

    Sections

  • $PLUGINSDIR/System.dll
    .dll windows:4 windows x86 arch:x86

    509a34b3a68a773e0afb4259e68f9f82


    Headers

    Imports

    Exports

    Sections

  • $PLUGINSDIR/ioSpecial.ini
  • $PLUGINSDIR/modern-header.bmp
  • $PLUGINSDIR/modern-wizard.bmp
  • $PLUGINSDIR/nsDialogs.dll
    .dll windows:4 windows x86 arch:x86

    3b477381217c97b22146297f93df2a92


    Headers

    Imports

    Exports

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections