General

  • Target

    aa165761092cdc5af48f8c3dce2f72b87a6d14d8a5ff1e16436bea9acacce93a

  • Size

    4.6MB

  • MD5

    ddb7767fad778e414cf36204231dae2a

  • SHA1

    b22644f5adfcd8684686bb8fff39bbd4cdcd45d7

  • SHA256

    aa165761092cdc5af48f8c3dce2f72b87a6d14d8a5ff1e16436bea9acacce93a

  • SHA512

    8d6e0a5ac5edebfc202a9de6daeaa861229c2188047dcb8cb708b9aa0049747c5a1ac31196601555f13d30ebe69ae25430a341b6e9d1b2bd73a9d3a897233dc7

  • SSDEEP

    98304:6XnovpyQyaFcurLVSVEI9tDev6F5RIoV2+SRWX0xMMeSM4u9:6X2yQtLrLV6XtDOY5aNRJxMjSq

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.110.112:5554

Signatures

  • Metasploit family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 5 IoCs

    Checks for missing Authenticode signature.

Files

  • aa165761092cdc5af48f8c3dce2f72b87a6d14d8a5ff1e16436bea9acacce93a
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • $PLUGINSDIR/InstallOptions.dll
    .dll windows:4 windows x86 arch:x86

    85f08eb0cbec010ecbc287fa68321173


    Headers

    Imports

    Exports

    Sections

  • $PLUGINSDIR/System.dll
    .dll windows:4 windows x86 arch:x86

    509a34b3a68a773e0afb4259e68f9f82


    Headers

    Imports

    Exports

    Sections

  • $PLUGINSDIR/ioSpecial.ini
  • $PLUGINSDIR/modern-header.bmp
  • $PLUGINSDIR/modern-wizard.bmp
  • $PLUGINSDIR/nsDialogs.dll
    .dll windows:4 windows x86 arch:x86

    3b477381217c97b22146297f93df2a92


    Headers

    Imports

    Exports

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections