General

  • Target

    af81446395e463606eeed2bc9eb4ddcc86f98ea4b41cce7430878679d161b54c

  • Size

    4.5MB

  • MD5

    575ad81ed5cf30393bd02d5da1bc70fa

  • SHA1

    626817ec4565f5804447d80747ebb043e57f0155

  • SHA256

    af81446395e463606eeed2bc9eb4ddcc86f98ea4b41cce7430878679d161b54c

  • SHA512

    6c1eee2f84a77c2d397462095d302f0cfb4b0e921087f4fa74c426308ddd95cb345a5c81160cbcb6e5d49cf0ceb128ff340d4f4250dc492990176dfd644b95ff

  • SSDEEP

    98304:2Xr3ay/mq1BjDtkQ079UKTzY32d6xayyNzped9HziQTQwFYT:27ay+q1HKUKcZxayyGd9HFkvT

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.231.135:728

Signatures

  • Metasploit family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 5 IoCs

    Checks for missing Authenticode signature.

Files

  • af81446395e463606eeed2bc9eb4ddcc86f98ea4b41cce7430878679d161b54c
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • $PLUGINSDIR/InstallOptions.dll
    .dll windows:4 windows x86 arch:x86

    85f08eb0cbec010ecbc287fa68321173


    Headers

    Imports

    Exports

    Sections

  • $PLUGINSDIR/System.dll
    .dll windows:4 windows x86 arch:x86

    509a34b3a68a773e0afb4259e68f9f82


    Headers

    Imports

    Exports

    Sections

  • $PLUGINSDIR/ioSpecial.ini
  • $PLUGINSDIR/modern-header.bmp
  • $PLUGINSDIR/modern-wizard.bmp
  • $PLUGINSDIR/nsDialogs.dll
    .dll windows:4 windows x86 arch:x86

    3b477381217c97b22146297f93df2a92


    Headers

    Imports

    Exports

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections