General

  • Target

    86c36b2e5c9fad17e284ce964100d93510434f0467cf3991f5fe002cc035413e.zip

  • Size

    52KB

  • MD5

    49b3f593449e4a46ce1ce0b1b1e01cc8

  • SHA1

    992288e6477e9386d064a4ac4f5ed1e4dd8772f8

  • SHA256

    86c36b2e5c9fad17e284ce964100d93510434f0467cf3991f5fe002cc035413e

  • SHA512

    6dfdfd882aed418a96ced360a6726c30e7b778a93e5ca2a46e994b88e72ebe3d8986397f888bce94a83fc4ab4e09a51d7e0fbec01c7e1d054474204ad0d21164

  • SSDEEP

    768:aQj2ze18eD5vRPZeUgczp8YkjXh+EXe8TIeZf2ubPheO0fn0CSy/tVSOGra0:L2w5UcpoXhHeneV2Mo5f0CN0ra0

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

127.0.0.1:12346

Signatures

  • Metasploit family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 86c36b2e5c9fad17e284ce964100d93510434f0467cf3991f5fe002cc035413e.zip
    .zip

    Password: infected

  • 7b021b996b65f29cae4896c11d3a31874e2d5c4ce8a7a212c8bedf7dcae0f8ae.exe
    .exe windows:4 windows x86 arch:x86

    481f47bbb2c9c21e108d65f52b04c448


    Headers

    Imports

    Sections