General

  • Target

    06dd08fbfc8e2bd668be307e71d81713_JaffaCakes118

  • Size

    72KB

  • Sample

    240624-bvgqjatajc

  • MD5

    06dd08fbfc8e2bd668be307e71d81713

  • SHA1

    8351c540a56f9ce444b915ae49eac9ddf90d8c42

  • SHA256

    cc2cd5bb7881d99b9c88ceb1c89eadc91c897e1b860a54ed5c11c9b2b42773a2

  • SHA512

    7e5d2f67051b636a7ba88f9e295e7962b54bb82e54b8617766903186dd3eb9e72a7903eb8b2498f54c454fa4f1fb4effcb6d4da6b3b58c8f4ed15ca08f430838

  • SSDEEP

    1536:IolBhK3+JHQ+cBMSDO1EUxQ+DpTVVPZ3d0RGT6KMb+KR0Nc8QsJq39:9lGOJH0Ml1tFTXPpGGT6Ke0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

158.194.136.86:4444

Targets

    • Target

      06dd08fbfc8e2bd668be307e71d81713_JaffaCakes118

    • Size

      72KB

    • MD5

      06dd08fbfc8e2bd668be307e71d81713

    • SHA1

      8351c540a56f9ce444b915ae49eac9ddf90d8c42

    • SHA256

      cc2cd5bb7881d99b9c88ceb1c89eadc91c897e1b860a54ed5c11c9b2b42773a2

    • SHA512

      7e5d2f67051b636a7ba88f9e295e7962b54bb82e54b8617766903186dd3eb9e72a7903eb8b2498f54c454fa4f1fb4effcb6d4da6b3b58c8f4ed15ca08f430838

    • SSDEEP

      1536:IolBhK3+JHQ+cBMSDO1EUxQ+DpTVVPZ3d0RGT6KMb+KR0Nc8QsJq39:9lGOJH0Ml1tFTXPpGGT6Ke0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks