General

  • Target

    8eb6c3cbbd1dc0cdd46d65f59b344aeb_JaffaCakes118

  • Size

    46KB

  • MD5

    8eb6c3cbbd1dc0cdd46d65f59b344aeb

  • SHA1

    c7b72f6994eb0f1c4d9e8265f79bce0cd41342f8

  • SHA256

    3abd1a95b0d9987df4c2719dae03cfa8708c202023faa92f8dc05ab88c3f67a8

  • SHA512

    0698be8b3c28b2cba8fa35ed081f23b3cd134b941c2b4322eb01a078b38d322c53f403e08a2dda2c4b0cefeda6366c5b94b0ab3ba62db66134b93cae75e60e88

  • SSDEEP

    768:IxdzGlw7Y5xHc0HoBUkOLGZGEefsVG0Mp3nroyVI8I1GGtFW/ejnFEq3:IxdzGlia80mUfLdEefBroGwGGtriq3

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.36.120:443

Signatures

  • Metasploit family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 8eb6c3cbbd1dc0cdd46d65f59b344aeb_JaffaCakes118
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections