General

  • Target

    f55ad470320f015c83de90df99a6d06e_JaffaCakes118

  • Size

    53KB

  • MD5

    f55ad470320f015c83de90df99a6d06e

  • SHA1

    59fba306001bffdfe63bde674ef79d1b10fa2b29

  • SHA256

    1eff8529e4eeb66ec8f1ac9c075f305860738471d3d30e9d07ccdec361d6b832

  • SHA512

    1be1441e70728bc8c084d49fec0af16dad0dd8521360e472e52213442186cdbb33c9e57d0a65cfc6009453b02c7a207ba57c00679fbd3431a78faf5a3e3fad37

  • SSDEEP

    384:jtQGl/awAKUhIBPEyEr/irrrDp7VbbFaDrrrfOqvspUDwGmU/Y2Tx:jNSFcDoLwGd/9

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.52.128:4444

Signatures

  • Metasploit family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • f55ad470320f015c83de90df99a6d06e_JaffaCakes118
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections