General

  • Target

    a554dd21ac8dc2e8531fab3fc7065955_JaffaCakes118

  • Size

    47KB

  • Sample

    240818-erjx9sxepk

  • MD5

    a554dd21ac8dc2e8531fab3fc7065955

  • SHA1

    e212393a29799d5043c9d999c1c17b52a599e296

  • SHA256

    8f2872bc2df55253ceae391f9067e0c3fe0a344b09f6f1727de5f7aa04d540a4

  • SHA512

    8ccb089a702058c378fe6a38392cf05b7c979b337a41600320914a2b0d0fa6f75f6828ac7f8c10a933cb406cb44248c6b25532586f738c54a7cb84cb58e8c855

  • SSDEEP

    768:IW0/Po7O7I04ZYOTzvhVB6rzazHeCDKn1rn0BhNAaut5xDzK7i54JGtFFCxJEhCC:Iqv04ffvnYHwHeCD0tn0+auBPKeKJGtT

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Targets

    • Target

      a554dd21ac8dc2e8531fab3fc7065955_JaffaCakes118

    • Size

      47KB

    • MD5

      a554dd21ac8dc2e8531fab3fc7065955

    • SHA1

      e212393a29799d5043c9d999c1c17b52a599e296

    • SHA256

      8f2872bc2df55253ceae391f9067e0c3fe0a344b09f6f1727de5f7aa04d540a4

    • SHA512

      8ccb089a702058c378fe6a38392cf05b7c979b337a41600320914a2b0d0fa6f75f6828ac7f8c10a933cb406cb44248c6b25532586f738c54a7cb84cb58e8c855

    • SSDEEP

      768:IW0/Po7O7I04ZYOTzvhVB6rzazHeCDKn1rn0BhNAaut5xDzK7i54JGtFFCxJEhCC:Iqv04ffvnYHwHeCD0tn0+auBPKeKJGtT

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks