General

  • Target

    cae155acd46ac52eb1bf27b52ab8fe31a445291f0fc64c013de6a8565827cf32

  • Size

    54KB

  • MD5

    d6a2cbb0401a3f54c632e96fd9b3bc2b

  • SHA1

    f49e4fae5f1b0230071cdf8c54cd7545ddff0eed

  • SHA256

    cae155acd46ac52eb1bf27b52ab8fe31a445291f0fc64c013de6a8565827cf32

  • SHA512

    7071831951aebe52afd12cc0b5c201eeb5e6b29eae11dd261a204b790794a7e9719c86c0c61fab0eeedfbb1d76cc7e20b734116d1ae85bf508011e6a2f4543e7

  • SSDEEP

    768:FqcyGIkugtiTmkBIPcjQkwgCNx0XKb6lJ6Jfj01YajhF8C9g2IYCH0I+kW947f:1jI1ggPIjla86lsJ702ajheC9g2vCBj

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.19.133:1301

Signatures

  • Metasploit family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • cae155acd46ac52eb1bf27b52ab8fe31a445291f0fc64c013de6a8565827cf32
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections