General

  • Target

    b390196f060616a88cf09bc3732969cf8d66063a576764a40d90bd69ad6f857e

  • Size

    54KB

  • MD5

    d06e1162b4df99f4d60dbea38f3d70f5

  • SHA1

    06e2e55523d5d4c509b48e9c277467cf5eac22b2

  • SHA256

    b390196f060616a88cf09bc3732969cf8d66063a576764a40d90bd69ad6f857e

  • SHA512

    f5faffea833a99040adff11110e079c1fc2d72fbfe3b953164306001d02981788da1466c8049a3b110b218de332da1213781bac3518af829c69e1527290c8669

  • SSDEEP

    768:oqcyGIkugSvJmAu9ckzHC+qLZR5hBSlXqctDnWMSg6IYCH0I+kW947f:yjI1gSRmqar+Z/wXqyDWMSg6vCBj

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.31.179:2216

Signatures

  • Metasploit family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • b390196f060616a88cf09bc3732969cf8d66063a576764a40d90bd69ad6f857e
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections