General

  • Target

    067a2e716c936bd03bbd1b35c973e39f_JaffaCakes118

  • Size

    144KB

  • Sample

    240623-rmrhrsxenk

  • MD5

    067a2e716c936bd03bbd1b35c973e39f

  • SHA1

    ce47a10acf1350a387004a375082284d4bf0bf9c

  • SHA256

    319114de89d79b8d09e71bdd6162c21c82773d10b465d55f1dd89f9dd72bae43

  • SHA512

    789faceb7a68197a43c5ee3cc1629d21a50ee2e285835eed7e59b27d9202aa9113045180350f9fd7622907ab538990c9e7a1a5ebf77a1196393a41e6012a0ee1

  • SSDEEP

    3072:+qqxbJghfsMqdnv2oaJanTMjF+AqrqX4UP151YpvbaBUSXXWTh:Cb60+sU+CIY+vbaW6XW

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Targets

    • Target

      067a2e716c936bd03bbd1b35c973e39f_JaffaCakes118

    • Size

      144KB

    • MD5

      067a2e716c936bd03bbd1b35c973e39f

    • SHA1

      ce47a10acf1350a387004a375082284d4bf0bf9c

    • SHA256

      319114de89d79b8d09e71bdd6162c21c82773d10b465d55f1dd89f9dd72bae43

    • SHA512

      789faceb7a68197a43c5ee3cc1629d21a50ee2e285835eed7e59b27d9202aa9113045180350f9fd7622907ab538990c9e7a1a5ebf77a1196393a41e6012a0ee1

    • SSDEEP

      3072:+qqxbJghfsMqdnv2oaJanTMjF+AqrqX4UP151YpvbaBUSXXWTh:Cb60+sU+CIY+vbaW6XW

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks