General

  • Target

    dc1dfba31b85f94cc5e321c0a9f4807a_JaffaCakes118

  • Size

    46KB

  • Sample

    240912-j82a4azalp

  • MD5

    dc1dfba31b85f94cc5e321c0a9f4807a

  • SHA1

    64de2e606362ed548f4c0c85cdc83b5e342f36ef

  • SHA256

    9f478bc1a43b8e07a69a993da856967e816db8894ab2be7b6180adc62af54150

  • SHA512

    9acb7445d10222dd7dd71fd050730df1d5d292dc8bb9a03456a0ee7904fccf970bb3f26984f78e1694d06420aff06d88fa796e8589678e0602dc6b879ee2d574

  • SSDEEP

    768:Iy95FvSErx3qsqbsmleFtdMibv6+PibMEBwY7qZt7+KcevhRq7jGTq3:IynFqAxa1b9iFilBVU7+30hA7Iq3

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/download_exec

C2

http://slicky.myvnc.com:80/INITM

Targets

    • Target

      dc1dfba31b85f94cc5e321c0a9f4807a_JaffaCakes118

    • Size

      46KB

    • MD5

      dc1dfba31b85f94cc5e321c0a9f4807a

    • SHA1

      64de2e606362ed548f4c0c85cdc83b5e342f36ef

    • SHA256

      9f478bc1a43b8e07a69a993da856967e816db8894ab2be7b6180adc62af54150

    • SHA512

      9acb7445d10222dd7dd71fd050730df1d5d292dc8bb9a03456a0ee7904fccf970bb3f26984f78e1694d06420aff06d88fa796e8589678e0602dc6b879ee2d574

    • SSDEEP

      768:Iy95FvSErx3qsqbsmleFtdMibv6+PibMEBwY7qZt7+KcevhRq7jGTq3:IynFqAxa1b9iFilBVU7+30hA7Iq3

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks