General

  • Target

    ce3af88ca8a3e07a11dffecc6fd9b5dbe5afb0aab6f91ea76f239bfb7ad0333c

  • Size

    54KB

  • MD5

    5f6e9fd0aa7e958b4c672b795a911447

  • SHA1

    3782691849b85931f10cf8ba0d964adebf8194a5

  • SHA256

    ce3af88ca8a3e07a11dffecc6fd9b5dbe5afb0aab6f91ea76f239bfb7ad0333c

  • SHA512

    9bef0c28b4a3d79bf64d0557ee5438f60b84a8e1ce288249cce910c66c99f7f5299c7d9b3e3f1359813202ab12f8c866d581772775de31cfa2aa3d125daa3a36

  • SSDEEP

    768:GqcyGIkugaX8mCM47je6CzTHS8FkHd6HeY3CSkjwE0QqgZIYCH0I+kW947f:UjI1gaZO7jlqWd+3CXUEHqgZvCBj

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.45.128:4307

Signatures

  • Metasploit family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • ce3af88ca8a3e07a11dffecc6fd9b5dbe5afb0aab6f91ea76f239bfb7ad0333c
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections