General

  • Target

    dbac8d735393db518b5d98d77cb4a45d_JaffaCakes118

  • Size

    72KB

  • Sample

    240912-c8qq2axcqh

  • MD5

    dbac8d735393db518b5d98d77cb4a45d

  • SHA1

    650e1a419a309d316d424a4e9e41101b664b2686

  • SHA256

    f52391d5ac05ba0316ed9986085058c658693c83c9b41057e6182735c7acb6f9

  • SHA512

    98ac2f44b3a4728a39dfa83614aab3d41e91685b96188a8678a775e32f9553f31fee31beb7630f7e386c64659263536b573f43296b1a6ffc4a2b024a97bd7ca4

  • SSDEEP

    1536:I1dNFD/5ORQ+We2Zydzc20v+gHoqqGFFEh3BMb+KR0Nc8QsJq39:gdNF7SDT2ZWFgHoqZMe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.2.4:4444

Targets

    • Target

      dbac8d735393db518b5d98d77cb4a45d_JaffaCakes118

    • Size

      72KB

    • MD5

      dbac8d735393db518b5d98d77cb4a45d

    • SHA1

      650e1a419a309d316d424a4e9e41101b664b2686

    • SHA256

      f52391d5ac05ba0316ed9986085058c658693c83c9b41057e6182735c7acb6f9

    • SHA512

      98ac2f44b3a4728a39dfa83614aab3d41e91685b96188a8678a775e32f9553f31fee31beb7630f7e386c64659263536b573f43296b1a6ffc4a2b024a97bd7ca4

    • SSDEEP

      1536:I1dNFD/5ORQ+We2Zydzc20v+gHoqqGFFEh3BMb+KR0Nc8QsJq39:gdNF7SDT2ZWFgHoqZMe0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks