General

  • Target

    b82f6c950e10c619df827097fe1e9a53_JaffaCakes118

  • Size

    72KB

  • Sample

    240822-s1p3javclc

  • MD5

    b82f6c950e10c619df827097fe1e9a53

  • SHA1

    e04f8747e59847dac1871c4f4d4c783092a0b561

  • SHA256

    158f82dc3e0c048ef9ad9048e23711cb0833876eb553942cc5ef3679a7c541fc

  • SHA512

    5166ce12bdb8b681568be22389fd5fccb92f06be0bd77e14f98d724785a7b84332c8f04a3550c2490eb1d84fb04084be883f87cf162f7701013c275a51138c3d

  • SSDEEP

    1536:ItV/RA0erTQ049bpHzxqi9xi7dW9Mb+KR0Nc8QsJq39:l0+Q0qbBzx5bi7dW9e0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/exec

Targets

    • Target

      b82f6c950e10c619df827097fe1e9a53_JaffaCakes118

    • Size

      72KB

    • MD5

      b82f6c950e10c619df827097fe1e9a53

    • SHA1

      e04f8747e59847dac1871c4f4d4c783092a0b561

    • SHA256

      158f82dc3e0c048ef9ad9048e23711cb0833876eb553942cc5ef3679a7c541fc

    • SHA512

      5166ce12bdb8b681568be22389fd5fccb92f06be0bd77e14f98d724785a7b84332c8f04a3550c2490eb1d84fb04084be883f87cf162f7701013c275a51138c3d

    • SSDEEP

      1536:ItV/RA0erTQ049bpHzxqi9xi7dW9Mb+KR0Nc8QsJq39:l0+Q0qbBzx5bi7dW9e0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

MITRE ATT&CK Enterprise v15

Tasks