General

  • Target

    fd42d4fcf564449aba8fd95a244c3aa8_JaffaCakes118

  • Size

    14KB

  • Sample

    240420-v4x9esdg37

  • MD5

    fd42d4fcf564449aba8fd95a244c3aa8

  • SHA1

    ef7ea75558180a661ff40b6f543db7c21680053f

  • SHA256

    e60d2df9d478e53886d28af78842e7825fbf6fd64ec98f0cfb7299f2e24fefb1

  • SHA512

    6a83ee8c8ec40e028ce323bdf3758429c308f9a061fac4958626ffc8d95821a3048097aef0b375ff7dd2535432539079f14c5192fb131e979d89840b8a40c393

  • SSDEEP

    384:f5iWduhPjKuWK2VPd/IpeLCdw9rDpWCl8CbW:xiquhPr2VFLLh8C

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

122.161.156.61:23137

Targets

    • Target

      fd42d4fcf564449aba8fd95a244c3aa8_JaffaCakes118

    • Size

      14KB

    • MD5

      fd42d4fcf564449aba8fd95a244c3aa8

    • SHA1

      ef7ea75558180a661ff40b6f543db7c21680053f

    • SHA256

      e60d2df9d478e53886d28af78842e7825fbf6fd64ec98f0cfb7299f2e24fefb1

    • SHA512

      6a83ee8c8ec40e028ce323bdf3758429c308f9a061fac4958626ffc8d95821a3048097aef0b375ff7dd2535432539079f14c5192fb131e979d89840b8a40c393

    • SSDEEP

      384:f5iWduhPjKuWK2VPd/IpeLCdw9rDpWCl8CbW:xiquhPr2VFLLh8C

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks