General

  • Target

    0f42b0ac47f6c61d4b38ac4add09662f4e49180131dc0dbbb0cfe612f466b06f

  • Size

    54KB

  • MD5

    d1b993b2b62877c7795ca444833497c4

  • SHA1

    029fa3bfcf6ef2a4b6c0d2e5a283ff17d70cd7be

  • SHA256

    0f42b0ac47f6c61d4b38ac4add09662f4e49180131dc0dbbb0cfe612f466b06f

  • SHA512

    818ffb40d79a52651f9abc5e6679ab47ee0a754aa875e71e58077bf9e8f55f02730c67387d0a2462061926d61433c9325c78050b8c6e10d8978125b4c8a3ec8e

  • SSDEEP

    768:pqcyGIkugHjlIZYmMPRXQf+SFoK7ETpNRJM5c4KC8wvg1IYCH0I+kW947f:JjI1gDlAODxKMMO4Kig1vCBj

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.1.109:1304

Signatures

  • Metasploit family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 0f42b0ac47f6c61d4b38ac4add09662f4e49180131dc0dbbb0cfe612f466b06f
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections