General

  • Target

    b3d65154f8e7b3b26dc424d2135a443206cb34bd51d5e0c3bad15a3a20161733

  • Size

    54KB

  • MD5

    6b0c1d9eca25fd72dbb02f83952ae053

  • SHA1

    eaba55b981eb96c34ce034c2bad39833b7049d95

  • SHA256

    b3d65154f8e7b3b26dc424d2135a443206cb34bd51d5e0c3bad15a3a20161733

  • SHA512

    ad0c61fe76772dcb65068d2be814c0da06d86cb53d67ba0f50b88651293c38e66b3f344a3eafa07d52e14b66196541a08e4e5ad656a6bbd3add1d0b562afbc8e

  • SSDEEP

    768:pM6IXf4uLNY/+7TSGf0rR1tuNfuh4iTOXmdY1i37tEQnPC1YiPW947f:1KfnLcyRfPeVOXmdY+tEIPyj

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.187.130:2110

Signatures

  • Metasploit family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • b3d65154f8e7b3b26dc424d2135a443206cb34bd51d5e0c3bad15a3a20161733
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections