General

  • Target

    62a29d06f61e1791f3b3d41aef4858c24fd63f3ee85758d0568f9254a315e8f3

  • Size

    54KB

  • MD5

    9d4b8b0ef8cf6ea73f1d308f6f502a35

  • SHA1

    52382fe65e684c25652d06292f655c2df29812cd

  • SHA256

    62a29d06f61e1791f3b3d41aef4858c24fd63f3ee85758d0568f9254a315e8f3

  • SHA512

    338fe652aa4ff9adddf15a82d697fbc518141f895aab161ec128616083677141af140ebe55e241883d462a7c780c5bf29db3a77a65453a468eb9665c44d695c6

  • SSDEEP

    768:eqcyGIkug1lfRGhFPNne78tvVbivBwJWqhNTziYELgSIYCH0I+kW947f:8jI1g1l8hFVnBEv2JvbziYELgSvCBj

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.246.130:1313

Signatures

  • Metasploit family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 62a29d06f61e1791f3b3d41aef4858c24fd63f3ee85758d0568f9254a315e8f3
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections