General

  • Target

    f29bf5a41f58f75d8381833e8bab00d9_JaffaCakes118

  • Size

    10KB

  • Sample

    240416-d9hmgsae3x

  • MD5

    f29bf5a41f58f75d8381833e8bab00d9

  • SHA1

    d1fb72ea9bba14e47512b41599c160640a36a034

  • SHA256

    9e4f9e63d9b073178eda1ca6fde672041be077bcc6284a43cfdea85832def323

  • SHA512

    0a3536923a79ec469253d94f65d9a8fd81d457a83680263c12a2411df3ca4ce7f845956ff4d65d010774d09ef5f45e4f6ed79c1cf417e27d77bade509a394626

  • SSDEEP

    192:Xf0acjjA90sWJrTjO6d6mNB7E5pz6rJoZgGy8P:XBYje0tJ3j0c7mOGy8P

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

93.177.103.184:1337

Targets

    • Target

      f29bf5a41f58f75d8381833e8bab00d9_JaffaCakes118

    • Size

      10KB

    • MD5

      f29bf5a41f58f75d8381833e8bab00d9

    • SHA1

      d1fb72ea9bba14e47512b41599c160640a36a034

    • SHA256

      9e4f9e63d9b073178eda1ca6fde672041be077bcc6284a43cfdea85832def323

    • SHA512

      0a3536923a79ec469253d94f65d9a8fd81d457a83680263c12a2411df3ca4ce7f845956ff4d65d010774d09ef5f45e4f6ed79c1cf417e27d77bade509a394626

    • SSDEEP

      192:Xf0acjjA90sWJrTjO6d6mNB7E5pz6rJoZgGy8P:XBYje0tJ3j0c7mOGy8P

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks