General

  • Target

    63acedc92d1edb5b0d5e659b99b43f61_JaffaCakes118

  • Size

    68KB

  • Sample

    240722-skamxavckj

  • MD5

    63acedc92d1edb5b0d5e659b99b43f61

  • SHA1

    1747b74e776c31a20b1cb5cdacdc13623d32f55c

  • SHA256

    bd7557a35561d2cf7a578eb758278863923dd8d7f3e30836d3a75deb08aaaa40

  • SHA512

    e348aec3b19e929e5a66f2108a4524f9b48174d0686eed1a227730b2d2dd127953ee64f237bc27405bb766f66602824c5470501298bcced53471c8f5b0a79cb4

  • SSDEEP

    1536:bBT0N8xV3+uiblJvcdxHzd2I03JUEbooPRrKKR5Y6beKGPD/9Zlk5Neqg:wjbl6xR2I03JltZrpR5YOeKGPD/9ZG5I

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

127.0.0.1:4444

Targets

    • Target

      63acedc92d1edb5b0d5e659b99b43f61_JaffaCakes118

    • Size

      68KB

    • MD5

      63acedc92d1edb5b0d5e659b99b43f61

    • SHA1

      1747b74e776c31a20b1cb5cdacdc13623d32f55c

    • SHA256

      bd7557a35561d2cf7a578eb758278863923dd8d7f3e30836d3a75deb08aaaa40

    • SHA512

      e348aec3b19e929e5a66f2108a4524f9b48174d0686eed1a227730b2d2dd127953ee64f237bc27405bb766f66602824c5470501298bcced53471c8f5b0a79cb4

    • SSDEEP

      1536:bBT0N8xV3+uiblJvcdxHzd2I03JUEbooPRrKKR5Y6beKGPD/9Zlk5Neqg:wjbl6xR2I03JltZrpR5YOeKGPD/9ZG5I

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks