General

  • Target

    f2748c34d64462c38ee4fa6b72e54fda689a29d89545d3d5f4378ed9f2475b44

  • Size

    54KB

  • MD5

    b9d7b01f521fb51aec8785021b672740

  • SHA1

    258c2865db42aea7b56e02ffdcf39ea4f4cfd206

  • SHA256

    f2748c34d64462c38ee4fa6b72e54fda689a29d89545d3d5f4378ed9f2475b44

  • SHA512

    ed93677b6b0668412d6696e6750655cb3d03999050f607de3eecec4674c39f07339379dc85cf4f367050f45a4307815b5b084cf27a70c6b6e52f7cd3b668fab2

  • SSDEEP

    768:vqcyGIkugba+BNHS9inc/mdifQeko+8M0lwgsIYCH0I+kW947f:DjI1gm2Ny9oifQQbM0lwgsvCBj

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.163.128:4327

Signatures

  • Metasploit family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • f2748c34d64462c38ee4fa6b72e54fda689a29d89545d3d5f4378ed9f2475b44
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections