General

  • Target

    023e1dbb122b154d452250232804eee31cebdd335830b59080a0d33519395dc4

  • Size

    54KB

  • MD5

    16bb006c771827503594899bdf90499e

  • SHA1

    374bd52f6738eefaacc61d463f3b9f96d045e1f9

  • SHA256

    023e1dbb122b154d452250232804eee31cebdd335830b59080a0d33519395dc4

  • SHA512

    1a21e0f2c2ae70f1af6295a43856f929d40c37b099b7b1d2c183599fddb7775a53160a97ad94ba3a3bd5b47806e6e39237189cb10b562f266de7ae219901b050

  • SSDEEP

    768:8qcyGIkugc1As1pHVXs4rAcUBbi149MsRVniZYbg2IYCH0I+kW947f:mjI1gQdpHVXsE7UBW1z6g2vCBj

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.206.129:4318

Signatures

  • Metasploit family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 023e1dbb122b154d452250232804eee31cebdd335830b59080a0d33519395dc4
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections