General

  • Target

    75df282554115586077880e7d665950f4517fa8ecb1121ce7d8c76466fc844c3

  • Size

    54KB

  • MD5

    2b1c8def16de259025c3a247184d64b5

  • SHA1

    dc70ab54ff985ba552f008221967feb72af7e134

  • SHA256

    75df282554115586077880e7d665950f4517fa8ecb1121ce7d8c76466fc844c3

  • SHA512

    46bf61fc9bda6246e0735d768c5a7c0d99e63af838c0cc823e4f009666aecf3ef52d8795d8c077f65e4823113111820d73db1393d467ab535f9423e9b62b11fc

  • SSDEEP

    768:Kw6IXf5KTmkBIPcEx/MOAhak8ED7DvJM+i2Mohng6t4QnPC1YiPW947f:KKfEPI3kZhp8ED/vf9t4IPyj

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

172.16.211.153:12345

Signatures

  • Metasploit family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 75df282554115586077880e7d665950f4517fa8ecb1121ce7d8c76466fc844c3
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections