General

  • Target

    fcd0b2b4cad0d1ce8aad94141b6e7ed8_JaffaCakes118

  • Size

    38KB

  • Sample

    240420-p7x5yahc39

  • MD5

    fcd0b2b4cad0d1ce8aad94141b6e7ed8

  • SHA1

    723b613b44122e224f163900945904ac8b9d1ac1

  • SHA256

    28db65c0397100f0ec32eb121a7c6ee80a01d7254f20aa9b9c6323eefb2088fa

  • SHA512

    e3adf09a4f87b62b6822bdade7848b52fb98289a09e9c9ce0a5ce42fd44160c756c0038d5ca1f124e4b6ddbce9809acef631673f0b8b9395f8c836a29bb158f0

  • SSDEEP

    384:GRHUHV4rBcGaAk3wDLMYo50KsQgisYp0jcR1drAyo7Z:GpamrBcGaAk3w1KrEYp04RHrAyS

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.243.2:55555

Targets

    • Target

      fcd0b2b4cad0d1ce8aad94141b6e7ed8_JaffaCakes118

    • Size

      38KB

    • MD5

      fcd0b2b4cad0d1ce8aad94141b6e7ed8

    • SHA1

      723b613b44122e224f163900945904ac8b9d1ac1

    • SHA256

      28db65c0397100f0ec32eb121a7c6ee80a01d7254f20aa9b9c6323eefb2088fa

    • SHA512

      e3adf09a4f87b62b6822bdade7848b52fb98289a09e9c9ce0a5ce42fd44160c756c0038d5ca1f124e4b6ddbce9809acef631673f0b8b9395f8c836a29bb158f0

    • SSDEEP

      384:GRHUHV4rBcGaAk3wDLMYo50KsQgisYp0jcR1drAyo7Z:GpamrBcGaAk3w1KrEYp04RHrAyS

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks