General

  • Target

    c5bd778d6cb31d3e6970e4df3d5d058bd9f95db7faae9fa55c5854d53b78898b

  • Size

    47KB

  • MD5

    07924a75dd7d92d04c18063bea0d0b61

  • SHA1

    12f1fc566c29f2db6548fcbba77daae1ff59fae3

  • SHA256

    c5bd778d6cb31d3e6970e4df3d5d058bd9f95db7faae9fa55c5854d53b78898b

  • SHA512

    c016ff36438146653d3579e994013529d945211f0c9dd2219fb38633bd590be5a1f5065ee125bc7e658086afc3a8b57304a0627dbef969e666dc07cef6ecbd22

  • SSDEEP

    768:Iwe8hnGkbDwaqsMyzzbrHWRAYzuxUbcaUM5lgVl0oAkDB4j8PkKIhSGLPUq3:Iwe8hGEq1y3HWRAOucWf0oF9P3GLsq3

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

193.117.208.148:7800

Signatures

  • Metasploit family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • c5bd778d6cb31d3e6970e4df3d5d058bd9f95db7faae9fa55c5854d53b78898b
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections