General

  • Target

    756cedbcdc63dfd334fa3df4df179bd3_JaffaCakes118

  • Size

    20KB

  • Sample

    240726-yam35stbmg

  • MD5

    756cedbcdc63dfd334fa3df4df179bd3

  • SHA1

    10ce474b6ec74930e6860d875d76599db1cafea1

  • SHA256

    a9f76895b2c46a2159151edc9f891b4a5e444779bfaf153c49fc5298d708302a

  • SHA512

    936fc75db133720f21e48529c9330bce29db24249ec285282d63b84e29e51f2cbe811c9913961de047639a5009dfecacec0fc18d8bb1a012127e2e875363eaee

  • SSDEEP

    192:ha7llWbVL8+VDA1h3BWLmmx9UqqASlnOHPr3unv+wvEFhI0KCMFY:haZQbVNU/GmmxmqxSh+Pr3uvrMnlxl

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.1.254:5555

Targets

    • Target

      756cedbcdc63dfd334fa3df4df179bd3_JaffaCakes118

    • Size

      20KB

    • MD5

      756cedbcdc63dfd334fa3df4df179bd3

    • SHA1

      10ce474b6ec74930e6860d875d76599db1cafea1

    • SHA256

      a9f76895b2c46a2159151edc9f891b4a5e444779bfaf153c49fc5298d708302a

    • SHA512

      936fc75db133720f21e48529c9330bce29db24249ec285282d63b84e29e51f2cbe811c9913961de047639a5009dfecacec0fc18d8bb1a012127e2e875363eaee

    • SSDEEP

      192:ha7llWbVL8+VDA1h3BWLmmx9UqqASlnOHPr3unv+wvEFhI0KCMFY:haZQbVNU/GmmxmqxSh+Pr3uvrMnlxl

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks