General

  • Target

    41ac3ef27adc6b635b5b295e6b87bdd1_JaffaCakes118

  • Size

    11KB

  • Sample

    240713-pqpr8s1arl

  • MD5

    41ac3ef27adc6b635b5b295e6b87bdd1

  • SHA1

    3d4bdc717df94a9ae5cd7e266f7fea97fc656406

  • SHA256

    e85460997f8f0a191427c38b8b7bd70ba6784c61fc9b881b1dbb9ac6107ed4d4

  • SHA512

    e7081819eca4703de207f0b7389cd974ce460386bbf4755e6346490558d870d10f65c8463cc4ac0dd2c027f0084b85cd71b6e488fd72f35e327ea25c794f2b66

  • SSDEEP

    192:xx++jH0GYYm6HPzNnOYORfiz8e3Q5tfmXU/S:xx+cH0aHgO3x7

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.122.1:1234

Targets

    • Target

      41ac3ef27adc6b635b5b295e6b87bdd1_JaffaCakes118

    • Size

      11KB

    • MD5

      41ac3ef27adc6b635b5b295e6b87bdd1

    • SHA1

      3d4bdc717df94a9ae5cd7e266f7fea97fc656406

    • SHA256

      e85460997f8f0a191427c38b8b7bd70ba6784c61fc9b881b1dbb9ac6107ed4d4

    • SHA512

      e7081819eca4703de207f0b7389cd974ce460386bbf4755e6346490558d870d10f65c8463cc4ac0dd2c027f0084b85cd71b6e488fd72f35e327ea25c794f2b66

    • SSDEEP

      192:xx++jH0GYYm6HPzNnOYORfiz8e3Q5tfmXU/S:xx+cH0aHgO3x7

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks