General

  • Target

    5276b39a55cb85f30195a5150dbb2b6407a596adbd3482cb0dc099049bba4224

  • Size

    47KB

  • MD5

    8c85fdc958d3299c7cb1fc0a82be0a28

  • SHA1

    4a26a14a230e1285ee3b4e622fe7922292e8cff5

  • SHA256

    5276b39a55cb85f30195a5150dbb2b6407a596adbd3482cb0dc099049bba4224

  • SHA512

    5c1e96d4873e8f16e8dd5f7d7e6911ed3410986d55914a453835a0124eb2b3a617890b67b78d2a9de27ebe49e37c01cb16838cdbb178e78af51fd05223a4a1b1

  • SSDEEP

    768:IB93PtkMdRPAowZUEkhwasYseaiqAiwEo03RnD/OjG9o7uQXq3:IH3FpRPAooUuleaiqVwEo0xD/LAuaq3

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

193.117.208.148:7800

Signatures

  • Metasploit family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 5276b39a55cb85f30195a5150dbb2b6407a596adbd3482cb0dc099049bba4224
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections