General

  • Target

    8aafcdf4e753a774084f1d7c6cc062976d93706d51d9278ad7ab67fe04f0a8f8

  • Size

    123KB

  • MD5

    a90bb8c2875a2d5958c8faf74a2dc9a9

  • SHA1

    e2c3d6cd5af7837a7e2b3dc6ce6f9a796757578a

  • SHA256

    8aafcdf4e753a774084f1d7c6cc062976d93706d51d9278ad7ab67fe04f0a8f8

  • SHA512

    b62cc8b0aa2afc8df29752652d510ba66eeff86d77b255c2db232396256e69356ee1a7c97675724b9122a8e5ba5ee504cc7a197d74d9b9350e48896f1a88d4ba

  • SSDEEP

    3072:OwdAdlNz9gBpgrMRZUdwuMQXf+j+LnCM/Vf6:XdA7gBhkdwuMys4Vi

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.1.114:4302

Signatures

  • Metasploit family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 8aafcdf4e753a774084f1d7c6cc062976d93706d51d9278ad7ab67fe04f0a8f8
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections