General

  • Target

    f8894880a2c58187bac8fe520ced9267_JaffaCakes118

  • Size

    205KB

  • Sample

    240418-xczpaach21

  • MD5

    f8894880a2c58187bac8fe520ced9267

  • SHA1

    2b7bc37c20e490a1b50f8512e1223ccd30cddfbb

  • SHA256

    1fb0be21aaa734ae8b91e0978ee55e99e9fef4f392da28cff90bcbf65c70718e

  • SHA512

    7c49b9b57dce63b33b66282601b94dd6a6c6363af9fc3802cb9fbe730cdc914e3b3130565c432d0e7a571aeb56b1c68a8f81a2fa615fb2e7e90b076ba8bdbae0

  • SSDEEP

    3072:iK0POcR+oaVrFPDBsBiR0sYWEW0wRsAdAN91aamADagKPM0P5lJlXyndcDtYR67:zHhVBPDWC0UqN9gBPfPfzydcDiA

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

87.30.48.146:4455

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Targets

    • Target

      f8894880a2c58187bac8fe520ced9267_JaffaCakes118

    • Size

      205KB

    • MD5

      f8894880a2c58187bac8fe520ced9267

    • SHA1

      2b7bc37c20e490a1b50f8512e1223ccd30cddfbb

    • SHA256

      1fb0be21aaa734ae8b91e0978ee55e99e9fef4f392da28cff90bcbf65c70718e

    • SHA512

      7c49b9b57dce63b33b66282601b94dd6a6c6363af9fc3802cb9fbe730cdc914e3b3130565c432d0e7a571aeb56b1c68a8f81a2fa615fb2e7e90b076ba8bdbae0

    • SSDEEP

      3072:iK0POcR+oaVrFPDBsBiR0sYWEW0wRsAdAN91aamADagKPM0P5lJlXyndcDtYR67:zHhVBPDWC0UqN9gBPfPfzydcDiA

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks