General

  • Target

    f009cde4ad81eb3c11a80968bc9c4f7dbc1b58f4671fdc3c39dce8aa09169ed4

  • Size

    54KB

  • MD5

    f2dbbdd45ee677c10579a0f5eab11545

  • SHA1

    f8c00f87add02830f9a05877c7b071652561a304

  • SHA256

    f009cde4ad81eb3c11a80968bc9c4f7dbc1b58f4671fdc3c39dce8aa09169ed4

  • SHA512

    0579e8c1a891a6186fbf3a19a6e71d08332987dc2bfb977b1050fd294f2581fab2e03247268b1c48db5f3f04f39a9d5b29dd9f8559a8c97ac9b557037f767bd0

  • SSDEEP

    768:EqcyGIkugBuP3fLEyQtB29/MOAhak8EDwUE+SSRkT7VcDRgjQaIYCH0I+kW947f:+jI1gE+2kZhp8EDwUYWg7VcD+QavCBj

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.56.1:1313

Signatures

  • Metasploit family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • f009cde4ad81eb3c11a80968bc9c4f7dbc1b58f4671fdc3c39dce8aa09169ed4
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections