Source: 1223.exe, type: SAMPLE | Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 1223.exe, type: SAMPLE | Matched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown |
Source: 1223.exe, type: SAMPLE | Matched rule: Metasploit Payloads - file msf.exe Author: Florian Roth |
Source: 2.2.1223.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 2.2.1223.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown |
Source: 2.2.1223.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Metasploit Payloads - file msf.exe Author: Florian Roth |
Source: 2.0.1223.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 2.0.1223.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown |
Source: 2.0.1223.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Metasploit Payloads - file msf.exe Author: Florian Roth |
Source: 00000002.00000002.3429041346.00000000004B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 00000002.00000002.3429041346.00000000004B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown |
Source: 00000002.00000002.3428931562.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 00000002.00000002.3428931562.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown |
Source: 00000002.00000000.2182326465.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 00000002.00000000.2182326465.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown |
Source: 1223.exe, type: SAMPLE | Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: 1223.exe, type: SAMPLE | Matched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23 |
Source: 1223.exe, type: SAMPLE | Matched rule: Msfpayloads_msf_10 date = 2017-02-09, hash1 = 3cd74fa28323c0d64f45507675ac08fb09bae4dd6b7e11f2832a4fbc70bb7082, author = Florian Roth, description = Metasploit Payloads - file msf.exe, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.2.1223.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: 2.2.1223.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23 |
Source: 2.2.1223.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Msfpayloads_msf_10 date = 2017-02-09, hash1 = 3cd74fa28323c0d64f45507675ac08fb09bae4dd6b7e11f2832a4fbc70bb7082, author = Florian Roth, description = Metasploit Payloads - file msf.exe, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 2.0.1223.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: 2.0.1223.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23 |
Source: 2.0.1223.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Msfpayloads_msf_10 date = 2017-02-09, hash1 = 3cd74fa28323c0d64f45507675ac08fb09bae4dd6b7e11f2832a4fbc70bb7082, author = Florian Roth, description = Metasploit Payloads - file msf.exe, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000002.00000002.3429041346.00000000004B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: 00000002.00000002.3429041346.00000000004B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23 |
Source: 00000002.00000002.3428931562.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: 00000002.00000002.3428931562.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23 |
Source: 00000002.00000000.2182326465.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: 00000002.00000000.2182326465.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\1223.exe | Code function: 2_2_00403287 push eax; iretd | 2_2_00403340 |
Source: C:\Users\user\Desktop\1223.exe | Code function: 2_2_004054AD push ebp; retf | 2_2_004054AE |
Source: C:\Users\user\Desktop\1223.exe | Code function: 2_2_004046B5 push eax; retf 000Eh | 2_2_00404701 |
Source: C:\Users\user\Desktop\1223.exe | Code function: 2_2_004054B6 push ds; retf | 2_2_004054E4 |
Source: C:\Users\user\Desktop\1223.exe | Code function: 2_2_00401323 push edx; retf | 2_2_004013F8 |
Source: C:\Users\user\Desktop\1223.exe | Code function: 2_2_0040132E push edx; retf | 2_2_004013F8 |
Source: C:\Users\user\Desktop\1223.exe | Code function: 2_2_004035F3 push ebp; retf | 2_2_004035F4 |
Source: C:\Users\user\Desktop\1223.exe | Code function: 2_2_00405583 push ds; retf | 2_2_004054E4 |
Source: C:\Users\user\Desktop\1223.exe | Code function: 2_2_004013B4 push edx; retf | 2_2_004013F8 |
Source: Yara match | File source: 1223.exe, type: SAMPLE |
Source: Yara match | File source: 2.2.1223.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 2.0.1223.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000002.00000002.3429041346.00000000004B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000002.3428931562.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000000.2182326465.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |