General

  • Target

    7797e0acd2715d36c685b4e5b6469c17_JaffaCakes118

  • Size

    5KB

  • Sample

    240727-kym66ayfpq

  • MD5

    7797e0acd2715d36c685b4e5b6469c17

  • SHA1

    7321579845b9c4a6f556ba2aced5f142c1fc74f6

  • SHA256

    3a5d3cf731094f13a0063355fe449f6cdd8a0021b3a7898d57426f39377c217c

  • SHA512

    b3f352d4f13f97cee21c712a1618a20ac43ecb1e0397e1c383bce2d570c32edc308d3795fefc51ba6ed5618e9ab34a9db6d8f7f2d6ef3c34b6a375e081586842

  • SSDEEP

    96:jcWllnK5psEkj19J7v9S/7PlHhdO25cFCnrkti:pKTsEo1f7VSBBdF+wnrkti

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      7797e0acd2715d36c685b4e5b6469c17_JaffaCakes118

    • Size

      5KB

    • MD5

      7797e0acd2715d36c685b4e5b6469c17

    • SHA1

      7321579845b9c4a6f556ba2aced5f142c1fc74f6

    • SHA256

      3a5d3cf731094f13a0063355fe449f6cdd8a0021b3a7898d57426f39377c217c

    • SHA512

      b3f352d4f13f97cee21c712a1618a20ac43ecb1e0397e1c383bce2d570c32edc308d3795fefc51ba6ed5618e9ab34a9db6d8f7f2d6ef3c34b6a375e081586842

    • SSDEEP

      96:jcWllnK5psEkj19J7v9S/7PlHhdO25cFCnrkti:pKTsEo1f7VSBBdF+wnrkti

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks