Behavioral task
behavioral1
Sample
wget-csb-ys.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
wget-csb-ys.exe
Resource
win10v2004-20240802-en
General
-
Target
wget-csb-ys.exe
-
Size
301KB
-
MD5
991dd93578e6b11df3ec6b13899bfba2
-
SHA1
180bb1a344f3a4bdd3bc932cd2a2e456087bb476
-
SHA256
7340367ba63ce3cfaec6b4fa85ade754cffaa6e7b30054217969e6ea72c8ea47
-
SHA512
7aa0424a3cd4d56d3aca333ae322023b41e126048f7fb39c02a3ebdd87cbccc875395e7a3d10ffb7f464f6a9e1e774c81f6b5b82dbc920fe0210eb6db4cd65f3
-
SSDEEP
6144:b0CEY5qWKe5vO0zS+NvCWAU8O+UppNt3+ueWCM+nzOv2/dNQw:bVHv5G0zBdCWAUDfNt3+u0VicPQw
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
45.120.107.132:1111
Signatures
-
Metasploit family
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource wget-csb-ys.exe
Files
-
wget-csb-ys.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 448KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 300KB - Virtual size: 300KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE