General

  • Target

    d67e4277f54a2812b6fefd20f883827a_JaffaCakes118

  • Size

    144KB

  • Sample

    240909-rm5qdsvdld

  • MD5

    d67e4277f54a2812b6fefd20f883827a

  • SHA1

    5e786e9b9cf89e8c117dcb558b4e05ad93945f7b

  • SHA256

    dc0982c0cd86056b8810f8636a79e6c473cba70f56902e805a17fd10ef0bc712

  • SHA512

    93e12bbdf3f8ca82d0ef649b0851ac1ac8557a5f85c3afe8ed1311f551e8847a4af7aed47b15f95a3c3e29b770f4eb168a602220edd6e2b09944b66562a11478

  • SSDEEP

    1536:dvcE7tLOK5CIozZGSgqU1qE5W6PNzJgqmLEpc8+5Wjiz+EblWvXSvGs3mByjsp5:dvhkdzwS41qmPN2h8P5ilAWu

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

72.199.171.241:81

Targets

    • Target

      d67e4277f54a2812b6fefd20f883827a_JaffaCakes118

    • Size

      144KB

    • MD5

      d67e4277f54a2812b6fefd20f883827a

    • SHA1

      5e786e9b9cf89e8c117dcb558b4e05ad93945f7b

    • SHA256

      dc0982c0cd86056b8810f8636a79e6c473cba70f56902e805a17fd10ef0bc712

    • SHA512

      93e12bbdf3f8ca82d0ef649b0851ac1ac8557a5f85c3afe8ed1311f551e8847a4af7aed47b15f95a3c3e29b770f4eb168a602220edd6e2b09944b66562a11478

    • SSDEEP

      1536:dvcE7tLOK5CIozZGSgqU1qE5W6PNzJgqmLEpc8+5Wjiz+EblWvXSvGs3mByjsp5:dvhkdzwS41qmPN2h8P5ilAWu

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks