Behavioral task
behavioral1
Sample
35be62f32be6b9ae06bb49026469da8e94df018977b6146133a540e6a88e5182.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
35be62f32be6b9ae06bb49026469da8e94df018977b6146133a540e6a88e5182.exe
Resource
win10v2004-20241007-en
General
-
Target
35be62f32be6b9ae06bb49026469da8e94df018977b6146133a540e6a88e5182.exe
-
Size
8KB
-
MD5
322e4f45b7bd0978780101285cd23f83
-
SHA1
8a15f373bad7edf12210ae24bef250a5d44863d3
-
SHA256
35be62f32be6b9ae06bb49026469da8e94df018977b6146133a540e6a88e5182
-
SHA512
8b6fcfd16940d87bef1a8c88ed08858aa8ddd14e0f03e9fa27e5f51c4e56761968dbe047512c7e732b004021b3b95fec061aad782dc72bcbce13438d22b508d6
-
SSDEEP
48:is0HOkBQQbicJ1centNxE2xfhMNFF4cWkyRN9xL7zd0YybGp2B/:0hSQ+cJumPJxCfFbWku9D0hbE2Z
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
metasploit_stager
192.168.10.133:1234
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 35be62f32be6b9ae06bb49026469da8e94df018977b6146133a540e6a88e5182.exe
Files
-
35be62f32be6b9ae06bb49026469da8e94df018977b6146133a540e6a88e5182.exe.exe windows:4 windows x64 arch:x64
b4c6fff030479aa3b12625be67bf4914
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
VirtualAlloc
ExitProcess
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 132B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hfpm Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE