General

  • Target

    076a7cc29181446f9f3d76d1f42ab369_JaffaCakes118

  • Size

    4KB

  • Sample

    240624-j75l5asfpa

  • MD5

    076a7cc29181446f9f3d76d1f42ab369

  • SHA1

    01144b643bf2956f20b10e3f680db59b4c82221f

  • SHA256

    fe0f1539c28608cc148cde62450a2b7559eb82f9dfe2d1a78b94d24393894366

  • SHA512

    f0acf6eaf7d8783b9824cdfa35b26320dc6fe6ab8e0fb2903908ea4c2b72c33a0428a54fd9a5c0aae9516262cd799dd8b77658bb6d3e2162751e1f089cb999d6

  • SSDEEP

    48:6WiggJG4W0MvSzZshYYE/BnegMTxtIe+X9/sP75yJLiZkRTso32PtAC6wxnvBRh:LxMGfiZshYJGdtI79/AOQGTso3IA2vTh

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp_allports

C2

192.168.57.133:4444

Targets

    • Target

      076a7cc29181446f9f3d76d1f42ab369_JaffaCakes118

    • Size

      4KB

    • MD5

      076a7cc29181446f9f3d76d1f42ab369

    • SHA1

      01144b643bf2956f20b10e3f680db59b4c82221f

    • SHA256

      fe0f1539c28608cc148cde62450a2b7559eb82f9dfe2d1a78b94d24393894366

    • SHA512

      f0acf6eaf7d8783b9824cdfa35b26320dc6fe6ab8e0fb2903908ea4c2b72c33a0428a54fd9a5c0aae9516262cd799dd8b77658bb6d3e2162751e1f089cb999d6

    • SSDEEP

      48:6WiggJG4W0MvSzZshYYE/BnegMTxtIe+X9/sP75yJLiZkRTso32PtAC6wxnvBRh:LxMGfiZshYJGdtI79/AOQGTso3IA2vTh

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks