General

  • Target

    756cedbcdc63dfd334fa3df4df179bd3_JaffaCakes118

  • Size

    20KB

  • MD5

    756cedbcdc63dfd334fa3df4df179bd3

  • SHA1

    10ce474b6ec74930e6860d875d76599db1cafea1

  • SHA256

    a9f76895b2c46a2159151edc9f891b4a5e444779bfaf153c49fc5298d708302a

  • SHA512

    936fc75db133720f21e48529c9330bce29db24249ec285282d63b84e29e51f2cbe811c9913961de047639a5009dfecacec0fc18d8bb1a012127e2e875363eaee

  • SSDEEP

    192:ha7llWbVL8+VDA1h3BWLmmx9UqqASlnOHPr3unv+wvEFhI0KCMFY:haZQbVNU/GmmxmqxSh+Pr3uvrMnlxl

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.1.254:5555

Signatures

  • Metasploit family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 756cedbcdc63dfd334fa3df4df179bd3_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections