General

  • Target

    131d2065ec526c44030511ee1a50bd66_JaffaCakes118

  • Size

    350KB

  • Sample

    240504-rqbxgsbc86

  • MD5

    131d2065ec526c44030511ee1a50bd66

  • SHA1

    932aa4e76b1d81614948efd16827ad937a88310c

  • SHA256

    32038a0981ce5b59056ac8308248820d466f0c25e3a3acee46ad5553da1fc7f6

  • SHA512

    8c5c0f9a4e8acfdc674acf4006c219f1a706248986a45571b2c8185252526e5d668e4ac42aac35581c8c14b96ad31c742c5139b4b397af8e4ce1c02478a79a1c

  • SSDEEP

    6144:YEWjlZs5t38dX6p5E42U7kp0TcnFOHuln+Otc+EkzI8jSejCE8aKP3sGvLShcy/N:11W+uFUDAQjdvi/ZOuL2xRu

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.43.57:4444

Targets

    • Target

      131d2065ec526c44030511ee1a50bd66_JaffaCakes118

    • Size

      350KB

    • MD5

      131d2065ec526c44030511ee1a50bd66

    • SHA1

      932aa4e76b1d81614948efd16827ad937a88310c

    • SHA256

      32038a0981ce5b59056ac8308248820d466f0c25e3a3acee46ad5553da1fc7f6

    • SHA512

      8c5c0f9a4e8acfdc674acf4006c219f1a706248986a45571b2c8185252526e5d668e4ac42aac35581c8c14b96ad31c742c5139b4b397af8e4ce1c02478a79a1c

    • SSDEEP

      6144:YEWjlZs5t38dX6p5E42U7kp0TcnFOHuln+Otc+EkzI8jSejCE8aKP3sGvLShcy/N:11W+uFUDAQjdvi/ZOuL2xRu

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks