General

  • Target

    596ee59d7dbd0eaad9855eceeed9e1960db0d9ad8455950b02fb58d932322e68

  • Size

    4.5MB

  • MD5

    6786c284ea3d1e6b89be12f630068a82

  • SHA1

    f526d2220589c134a3feb04f5a8bfc16ac613436

  • SHA256

    596ee59d7dbd0eaad9855eceeed9e1960db0d9ad8455950b02fb58d932322e68

  • SHA512

    17c478e87a4c6382b632f3328418f3883616cdb35f658a0f95b4584755adc49a5732c56ab362dc5869d3ac4f0a19d23214450baac834b6e8c0098752ec377151

  • SSDEEP

    98304:V7jXr3ay/mq1BjDtkQ079UKTzY32d6xayyNzped9HziQTQwFYT:V7j7ay+q1HKUKcZxayyGd9HFkvT

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.81.133:3333

Signatures

  • Metasploit family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 5 IoCs

    Checks for missing Authenticode signature.

Files

  • 596ee59d7dbd0eaad9855eceeed9e1960db0d9ad8455950b02fb58d932322e68
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • $PLUGINSDIR/InstallOptions.dll
    .dll windows:4 windows x86 arch:x86

    85f08eb0cbec010ecbc287fa68321173


    Headers

    Imports

    Exports

    Sections

  • $PLUGINSDIR/System.dll
    .dll windows:4 windows x86 arch:x86

    509a34b3a68a773e0afb4259e68f9f82


    Headers

    Imports

    Exports

    Sections

  • $PLUGINSDIR/ioSpecial.ini
  • $PLUGINSDIR/modern-header.bmp
  • $PLUGINSDIR/modern-wizard.bmp
  • $PLUGINSDIR/nsDialogs.dll
    .dll windows:4 windows x86 arch:x86

    3b477381217c97b22146297f93df2a92


    Headers

    Imports

    Exports

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections