General

  • Target

    65e3a340d8eba05c74e17a19fddc1ef57f84160079728a4ab9730c6d9c4ebb95

  • Size

    29KB

  • MD5

    9ab3f12abd008eadf507eb00ee44f620

  • SHA1

    af13b3ed5954394d8ef07b3fcf56aee9a9edcdd3

  • SHA256

    65e3a340d8eba05c74e17a19fddc1ef57f84160079728a4ab9730c6d9c4ebb95

  • SHA512

    1831e82b5376ef9e329b6657f96c152fb87bf8dcacaee7639942bf467daf11a435ea3af89fd1f47ac3ace9d269d250bdf60509debf0ad54e9003094c6b5f8db8

  • SSDEEP

    768:u0etqMjEYqY+h0kNjn0nHEeHGyjBVNIRxbSh1:usgEYoulDjuxWh

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.174.143:44444

Signatures

  • Metasploit family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 65e3a340d8eba05c74e17a19fddc1ef57f84160079728a4ab9730c6d9c4ebb95
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections