General

  • Target

    e47bfcc50a7ccc5238e60ca6787c0c78_JaffaCakes118

  • Size

    72KB

  • Sample

    240916-lja4qazgqd

  • MD5

    e47bfcc50a7ccc5238e60ca6787c0c78

  • SHA1

    f3f6ce00bd4c6a69ef289b015b4e6de35da2f99c

  • SHA256

    7dcf11ab2fd63daf73f687ccd1732e3954023346b4fdca5b4b45375c6ca7d424

  • SHA512

    33a0eff67f9c61aa3d678901ce204db3a8bc95e2e54f87ee77cd991810fe19e0fcc9aff0e12207e98463b11bfd9c7d4a8c776084ada9d3b0f0382352f7b4f678

  • SSDEEP

    1536:Iu3BC6+jURE96Br5lCxxw3DPNC73UWizUMb+KR0Nc8QsJq39:XBR+juE96UxkNCLhe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.1.103:4444

Targets

    • Target

      e47bfcc50a7ccc5238e60ca6787c0c78_JaffaCakes118

    • Size

      72KB

    • MD5

      e47bfcc50a7ccc5238e60ca6787c0c78

    • SHA1

      f3f6ce00bd4c6a69ef289b015b4e6de35da2f99c

    • SHA256

      7dcf11ab2fd63daf73f687ccd1732e3954023346b4fdca5b4b45375c6ca7d424

    • SHA512

      33a0eff67f9c61aa3d678901ce204db3a8bc95e2e54f87ee77cd991810fe19e0fcc9aff0e12207e98463b11bfd9c7d4a8c776084ada9d3b0f0382352f7b4f678

    • SSDEEP

      1536:Iu3BC6+jURE96Br5lCxxw3DPNC73UWizUMb+KR0Nc8QsJq39:XBR+juE96UxkNCLhe0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks