General

  • Target

    07bb3dde48e541fa09c1577baed59f39_JaffaCakes118

  • Size

    130KB

  • Sample

    240620-tx7zls1dlj

  • MD5

    07bb3dde48e541fa09c1577baed59f39

  • SHA1

    dfa3afb0d9ba0002dc476e00d3f2d1e4f07377d9

  • SHA256

    c282c9b409d94c7c774056354f162d6278e60c577bdfdc1a684d58221358e002

  • SHA512

    b10de1a7ea3d1fd8ab05ab95cb55d312976046a45bf6f439a440cf19f1048579bfd1c2d9ee5f656246db62001b6529322bb082eed83cf9b9969895f37e658e50

  • SSDEEP

    1536:zxvCsM+SYGt71D4ROqjc5pVZUb7hDzD2etD3E4rAqhV9gHcE/8Db9MOUyZskm1Mj:FqHh/y

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      07bb3dde48e541fa09c1577baed59f39_JaffaCakes118

    • Size

      130KB

    • MD5

      07bb3dde48e541fa09c1577baed59f39

    • SHA1

      dfa3afb0d9ba0002dc476e00d3f2d1e4f07377d9

    • SHA256

      c282c9b409d94c7c774056354f162d6278e60c577bdfdc1a684d58221358e002

    • SHA512

      b10de1a7ea3d1fd8ab05ab95cb55d312976046a45bf6f439a440cf19f1048579bfd1c2d9ee5f656246db62001b6529322bb082eed83cf9b9969895f37e658e50

    • SSDEEP

      1536:zxvCsM+SYGt71D4ROqjc5pVZUb7hDzD2etD3E4rAqhV9gHcE/8Db9MOUyZskm1Mj:FqHh/y

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks