Click to jump to signature section
Source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe | Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 178.238.231.204 |
Source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe | String found in binary or memory: http://www.apache.org/ |
Source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0 |
Source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe | String found in binary or memory: http://www.zeustech.net/ |
Source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe, type: SAMPLE | Matched rule: Identifies another 64 bit API hashing function used by Metasploit. Author: unknown |
Source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe, type: SAMPLE | Matched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown |
Source: 0.0.payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Identifies another 64 bit API hashing function used by Metasploit. Author: unknown |
Source: 0.0.payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown |
Source: 0.2.payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Identifies another 64 bit API hashing function used by Metasploit. Author: unknown |
Source: 0.2.payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown |
Source: 00000000.00000002.1586603024.0000000000480000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Identifies another 64 bit API hashing function used by Metasploit. Author: unknown |
Source: 00000000.00000002.1586603024.0000000000480000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown |
Source: 00000000.00000002.1586510353.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Identifies another 64 bit API hashing function used by Metasploit. Author: unknown |
Source: 00000000.00000002.1586510353.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown |
Source: 00000000.00000000.1352180995.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Identifies another 64 bit API hashing function used by Metasploit. Author: unknown |
Source: 00000000.00000000.1352180995.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown |
Source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe, 00000000.00000000.1352238009.0000000000415000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameab.exeF vs payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe |
Source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe | Binary or memory string: OriginalFilenameab.exeF vs payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe |
Source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe | Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
Source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe, type: SAMPLE | Matched rule: Windows_Trojan_Metasploit_96233b6b reference_sample = e7a2d966deea3a2df6ce1aeafa8c2caa753824215a8368e0a96b394fb46b753b, os = windows, severity = x86, description = Identifies another 64 bit API hashing function used by Metasploit., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 40032849674714bc9eb020971dd9f27a07b53b8ff953b793cb3aad136256fd70, id = 96233b6b-d95a-4e0e-8f83-f2282a342087, last_modified = 2021-08-23 |
Source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe, type: SAMPLE | Matched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23 |
Source: 0.0.payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Metasploit_96233b6b reference_sample = e7a2d966deea3a2df6ce1aeafa8c2caa753824215a8368e0a96b394fb46b753b, os = windows, severity = x86, description = Identifies another 64 bit API hashing function used by Metasploit., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 40032849674714bc9eb020971dd9f27a07b53b8ff953b793cb3aad136256fd70, id = 96233b6b-d95a-4e0e-8f83-f2282a342087, last_modified = 2021-08-23 |
Source: 0.0.payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23 |
Source: 0.2.payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Metasploit_96233b6b reference_sample = e7a2d966deea3a2df6ce1aeafa8c2caa753824215a8368e0a96b394fb46b753b, os = windows, severity = x86, description = Identifies another 64 bit API hashing function used by Metasploit., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 40032849674714bc9eb020971dd9f27a07b53b8ff953b793cb3aad136256fd70, id = 96233b6b-d95a-4e0e-8f83-f2282a342087, last_modified = 2021-08-23 |
Source: 0.2.payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23 |
Source: 00000000.00000002.1586603024.0000000000480000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_96233b6b reference_sample = e7a2d966deea3a2df6ce1aeafa8c2caa753824215a8368e0a96b394fb46b753b, os = windows, severity = x86, description = Identifies another 64 bit API hashing function used by Metasploit., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 40032849674714bc9eb020971dd9f27a07b53b8ff953b793cb3aad136256fd70, id = 96233b6b-d95a-4e0e-8f83-f2282a342087, last_modified = 2021-08-23 |
Source: 00000000.00000002.1586603024.0000000000480000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23 |
Source: 00000000.00000002.1586510353.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_96233b6b reference_sample = e7a2d966deea3a2df6ce1aeafa8c2caa753824215a8368e0a96b394fb46b753b, os = windows, severity = x86, description = Identifies another 64 bit API hashing function used by Metasploit., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 40032849674714bc9eb020971dd9f27a07b53b8ff953b793cb3aad136256fd70, id = 96233b6b-d95a-4e0e-8f83-f2282a342087, last_modified = 2021-08-23 |
Source: 00000000.00000002.1586510353.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23 |
Source: 00000000.00000000.1352180995.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_96233b6b reference_sample = e7a2d966deea3a2df6ce1aeafa8c2caa753824215a8368e0a96b394fb46b753b, os = windows, severity = x86, description = Identifies another 64 bit API hashing function used by Metasploit., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 40032849674714bc9eb020971dd9f27a07b53b8ff953b793cb3aad136256fd70, id = 96233b6b-d95a-4e0e-8f83-f2282a342087, last_modified = 2021-08-23 |
Source: 00000000.00000000.1352180995.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe | Code function: 0_2_00402842 push edx; ret | 0_2_00402846 |
Source: C:\Users\user\Desktop\payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe | Code function: 0_2_0040124A push eax; ret | 0_2_00401253 |
Source: C:\Users\user\Desktop\payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe | Code function: 0_2_00405E4E push ecx; iretd | 0_2_00405E54 |
Source: C:\Users\user\Desktop\payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe | Code function: 0_2_00405E50 push ecx; iretd | 0_2_00405E54 |
Source: C:\Users\user\Desktop\payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe | Code function: 0_2_004026DD push FFFFFF93h; retf | 0_2_004026FE |
Source: C:\Users\user\Desktop\payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe | Code function: 0_2_004030E0 push ebp; retf | 0_2_00403161 |
Source: C:\Users\user\Desktop\payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe | Code function: 0_2_004026E3 push FFFFFF93h; retf | 0_2_004026FE |
Source: C:\Users\user\Desktop\payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe | Code function: 0_2_00403909 push es; ret | 0_2_00403916 |
Source: Yara match | File source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe, type: SAMPLE |
Source: Yara match | File source: 0.0.payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000002.1586603024.0000000000480000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.1586510353.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000000.1352180995.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |