General

  • Target

    5ab79ce7433c42b3c339b29e15ba6b2f_JaffaCakes118

  • Size

    211KB

  • Sample

    240719-gl82bavhqj

  • MD5

    5ab79ce7433c42b3c339b29e15ba6b2f

  • SHA1

    713fad90f34633675abf3decc3856e15428e4b31

  • SHA256

    2d160ad1a60afa43bdfe6d5e3f0640bc84d75e824c91b92c536192a59777c310

  • SHA512

    d60041a0d671c2ec716829c12510ffd3f8026ce1954b9990867246ea8b4c9400442d96b5559a67b4c9f44b109cb2e1c74d670d307f49c428ba201152bd782bc7

  • SSDEEP

    6144:FWF93cU8h1/Z2Vi07FxC567Ym88BhzLs/a3hxUG:FWF7g1xgiQHC56BBhzL0chD

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.186.136:1357

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Targets

    • Target

      5ab79ce7433c42b3c339b29e15ba6b2f_JaffaCakes118

    • Size

      211KB

    • MD5

      5ab79ce7433c42b3c339b29e15ba6b2f

    • SHA1

      713fad90f34633675abf3decc3856e15428e4b31

    • SHA256

      2d160ad1a60afa43bdfe6d5e3f0640bc84d75e824c91b92c536192a59777c310

    • SHA512

      d60041a0d671c2ec716829c12510ffd3f8026ce1954b9990867246ea8b4c9400442d96b5559a67b4c9f44b109cb2e1c74d670d307f49c428ba201152bd782bc7

    • SSDEEP

      6144:FWF93cU8h1/Z2Vi07FxC567Ym88BhzLs/a3hxUG:FWF7g1xgiQHC56BBhzL0chD

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks