Behavioral task
behavioral1
Sample
9724a3b9cbfe7f209ffda452e8fc8e3cbfd5b7f38c5149453760868dc6aabbfeN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9724a3b9cbfe7f209ffda452e8fc8e3cbfd5b7f38c5149453760868dc6aabbfeN.exe
Resource
win10v2004-20241007-en
General
-
Target
9724a3b9cbfe7f209ffda452e8fc8e3cbfd5b7f38c5149453760868dc6aabbfeN
-
Size
898KB
-
MD5
298694c454b1b6977f4f0ee1464df800
-
SHA1
f28f8ae5350d1086475706d2f2dbe6c18d64c7da
-
SHA256
9724a3b9cbfe7f209ffda452e8fc8e3cbfd5b7f38c5149453760868dc6aabbfe
-
SHA512
df45d0bf74ef29aaaedf441206d574c9b95255b8523c288c3bb0216b08856bcf38a78a299dba13e8918e027a3d9bde478e3e7f5f5f7bad9bca7d27a902d501e6
-
SSDEEP
24576:21+hn0CHRV8uiETwwfOCxjnD/WxPds0dIZorWQ4ad50yCj2hU:V5RV8uiFpULD/WxFs0WZorn4a4yC1
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
192.168.0.7:4444
Signatures
-
Metasploit family
-
Processes:
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
Processes:
resource 9724a3b9cbfe7f209ffda452e8fc8e3cbfd5b7f38c5149453760868dc6aabbfeN unpack001/out.upx
Files
-
9724a3b9cbfe7f209ffda452e8fc8e3cbfd5b7f38c5149453760868dc6aabbfeN.exe windows:6 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
UPX0 Size: - Virtual size: 264KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 867KB - Virtual size: 868KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:6 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 509KB - Virtual size: 509KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 153KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gxfg Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 17B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 363KB - Virtual size: 362KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ