General

  • Target

    fc568b860a0443957a6adf45409355a3_JaffaCakes118

  • Size

    279KB

  • Sample

    240420-ka9p9adb5t

  • MD5

    fc568b860a0443957a6adf45409355a3

  • SHA1

    5e7f1a2cf9cbc3de721b6fd0eb99b3f52e941551

  • SHA256

    6748f522ed8903b1588599bcb52207e3140c1598ed6cbe8ab11c07f8f4ecf9cd

  • SHA512

    5b0b4633d2c266764434c14f9633011a4c04e5fb438b6f6c924d9b453e7a9f567ebb29772bfd1b02c2d2cd675c02177afc7055945f2dbd7a014bb2a2f375ae42

  • SSDEEP

    3072:25wLR7Szb178Mov1oMolktC/TQyJ7UwfddZmrkZcNEtu+cRw24io:GwFAhCSjG4/Fmrk1K4io

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

198.167.219.9:443

Targets

    • Target

      fc568b860a0443957a6adf45409355a3_JaffaCakes118

    • Size

      279KB

    • MD5

      fc568b860a0443957a6adf45409355a3

    • SHA1

      5e7f1a2cf9cbc3de721b6fd0eb99b3f52e941551

    • SHA256

      6748f522ed8903b1588599bcb52207e3140c1598ed6cbe8ab11c07f8f4ecf9cd

    • SHA512

      5b0b4633d2c266764434c14f9633011a4c04e5fb438b6f6c924d9b453e7a9f567ebb29772bfd1b02c2d2cd675c02177afc7055945f2dbd7a014bb2a2f375ae42

    • SSDEEP

      3072:25wLR7Szb178Mov1oMolktC/TQyJ7UwfddZmrkZcNEtu+cRw24io:GwFAhCSjG4/Fmrk1K4io

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks