Behavioral task
behavioral1
Sample
reverse.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
reverse.exe
Resource
win10v2004-20240802-en
General
-
Target
reverse.exe
-
Size
7KB
-
MD5
862e4148018b420063f6884b594d1a05
-
SHA1
151896764c8c71b8b2462a7a2f3b859cb71df8ae
-
SHA256
5bd5e24c42f25fc7227224896057350497bb3d37a8242404e093a04960d976e1
-
SHA512
3cd47d516fd9f1d4ff7d320a1f83fdeae0b067a8e93d028bf1ee836b7f040a3c36f5942ee225d54c92a3137ad83b16c060941649a664182739e8c10dff85469e
-
SSDEEP
24:eFGStrJ9u0/6nHnZdkBQAV2G1k/wKLqFx1eNDMSCvOXpmB:is0mjkBQW+Ilx1SD9C2kB
Malware Config
Extracted
metasploit
metasploit_stager
147.185.221.20:36125
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource reverse.exe
Files
-
reverse.exe.exe windows:4 windows x64 arch:x64
b4c6fff030479aa3b12625be67bf4914
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
VirtualAlloc
ExitProcess
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 132B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dpss Size: 1024B - Virtual size: 632B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE