General

  • Target

    file.tar.gz

  • Size

    43KB

  • MD5

    da5c3fea10a3b5267a362a819a9c8dd8

  • SHA1

    1166523a221ded1d872a5831d10e489be24c80bd

  • SHA256

    2bd078cf0d60afb81f0e22e85d283283bc1acd993051c2180db1720400759f0b

  • SHA512

    0e3323e346f9cfc59e0c3f5067697cd45f5a51d2ae446b105f6ce64af818423c3619d12f9edef7e3f4d101763e4e4c5ce6e71e837ee195f33364ec255b87f19d

  • SSDEEP

    768:0JUp7CAHXDlA1hVhyGyNVCQz6a9BB2b0qyx77WpY3JYS4jJ49d+thh2SVh:0JUpWAHXGXVhyGyNwQzxLB2bSJapY3CR

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

127.0.0.1:443

Signatures

  • Metasploit family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • file.tar.gz
    .gz

    Password: testing

  • sample
    .tar

    Password: testing

  • windows-meterpreter-staged-reverse-tcp-443.exe
    .exe windows:4 windows x86 arch:x86

    Password: testing

    481f47bbb2c9c21e108d65f52b04c448


    Headers

    Imports

    Sections