Behavioral task
behavioral1
Sample
7dd90e7ba0cdb02e20916fa05c7539c9eddc4d48329a06531c0be69a20d27d98.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7dd90e7ba0cdb02e20916fa05c7539c9eddc4d48329a06531c0be69a20d27d98.exe
Resource
win10v2004-20241007-en
General
-
Target
7dd90e7ba0cdb02e20916fa05c7539c9eddc4d48329a06531c0be69a20d27d98
-
Size
18KB
-
MD5
a89aeda654710c8449d07f87fad526e3
-
SHA1
c9b0049d18a3cb481ec400c797c583568b0f03af
-
SHA256
7dd90e7ba0cdb02e20916fa05c7539c9eddc4d48329a06531c0be69a20d27d98
-
SHA512
4850900335eb29a6b5c41b69d399027e40caf782b62bb0824890a7aa62084f8923378448477160ce652d60cdf504d1ab625f53f800c4291a5decaa061299c367
-
SSDEEP
384:imE2NITSaVfknBBBBL+/3Tuzh8bIZSCW:iphVkODuzqsZZW
Malware Config
Extracted
metasploit
windows/shell_bind_tcp
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7dd90e7ba0cdb02e20916fa05c7539c9eddc4d48329a06531c0be69a20d27d98
Files
-
7dd90e7ba0cdb02e20916fa05c7539c9eddc4d48329a06531c0be69a20d27d98.exe windows:4 windows x64 arch:x64
d1b8fc10f8d5800f7935efe1db6bf8d0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CreateThread
DeleteCriticalSection
EnterCriticalSection
GetLastError
InitializeCriticalSection
LeaveCriticalSection
SetUnhandledExceptionFilter
Sleep
TlsGetValue
VirtualAlloc
VirtualProtect
VirtualQuery
WaitForSingleObject
msvcrt
__C_specific_handler
__getmainargs
__initenv
__iob_func
__set_app_type
__setusermatherr
_amsg_exit
_cexit
_commode
_fmode
_initterm
_onexit
abort
calloc
exit
fprintf
free
fwrite
malloc
memcpy
signal
strlen
strncmp
vfprintf
libstdc++-6
_ZNKSt5ctypeIcE13_M_widen_initEv
_ZNSo3putEc
_ZNSo5flushEv
_ZSt16__throw_bad_castv
_ZSt4cerr
_ZStlsISt11char_traitsIcEERSt13basic_ostreamIcT_ES5_PKc
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 144B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 1024B - Virtual size: 552B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 512B - Virtual size: 416B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 384B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 124B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ