General

  • Target

    c65316ba444468cda548e215fc0989fa1716a57819eef7b311c581e81890cd5f

  • Size

    4.5MB

  • MD5

    047715e90ac9c626d3f80b47c4dce481

  • SHA1

    51b57299d3bb0c24d5d181ebaa10d5a0a653a3f0

  • SHA256

    c65316ba444468cda548e215fc0989fa1716a57819eef7b311c581e81890cd5f

  • SHA512

    48f41839f02c4648b531d48441eaaf89cc070a2163fd71eb32e2d3fdb23e6caa7021540d516b0b6789099414ee180fcffbc063cdb58764728b736cc7cddb76c1

  • SSDEEP

    98304:WXr3ay/mq1BjDtkQ079UKTzY32d6xayyNzped9HziQTQwFYT:W7ay+q1HKUKcZxayyGd9HFkvT

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.149.133:9080

Signatures

  • Metasploit family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 5 IoCs

    Checks for missing Authenticode signature.

Files

  • c65316ba444468cda548e215fc0989fa1716a57819eef7b311c581e81890cd5f
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • $PLUGINSDIR/InstallOptions.dll
    .dll windows:4 windows x86 arch:x86

    85f08eb0cbec010ecbc287fa68321173


    Headers

    Imports

    Exports

    Sections

  • $PLUGINSDIR/System.dll
    .dll windows:4 windows x86 arch:x86

    509a34b3a68a773e0afb4259e68f9f82


    Headers

    Imports

    Exports

    Sections

  • $PLUGINSDIR/ioSpecial.ini
  • $PLUGINSDIR/modern-header.bmp
  • $PLUGINSDIR/modern-wizard.bmp
  • $PLUGINSDIR/nsDialogs.dll
    .dll windows:4 windows x86 arch:x86

    3b477381217c97b22146297f93df2a92


    Headers

    Imports

    Exports

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections