General

  • Target

    ea53bbad82d1dfd95698747821afb177_JaffaCakes118

  • Size

    72KB

  • Sample

    240919-bp1w8atcmk

  • MD5

    ea53bbad82d1dfd95698747821afb177

  • SHA1

    75196dcb14afb5d52665bcdc978c4231924362a9

  • SHA256

    406599bfb8c35eef4b18397b2505218892634c83600578413f8e2082ae4fb399

  • SHA512

    d242b8c7f9a90344bbef9211bdde8603908f2ad2ef707c3c0a89b620f3dba099860137907877aa96d31653a96c4b89f53084c939ca49489ddb04b1d2b085a345

  • SSDEEP

    1536:IX5qq+0XcsBXmE0LfGqvX7xosaQ07R/6DL3VMb+KR0Nc8QsJq39:C5epEQGiLKsaRxeVe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.1.5:4444

Targets

    • Target

      ea53bbad82d1dfd95698747821afb177_JaffaCakes118

    • Size

      72KB

    • MD5

      ea53bbad82d1dfd95698747821afb177

    • SHA1

      75196dcb14afb5d52665bcdc978c4231924362a9

    • SHA256

      406599bfb8c35eef4b18397b2505218892634c83600578413f8e2082ae4fb399

    • SHA512

      d242b8c7f9a90344bbef9211bdde8603908f2ad2ef707c3c0a89b620f3dba099860137907877aa96d31653a96c4b89f53084c939ca49489ddb04b1d2b085a345

    • SSDEEP

      1536:IX5qq+0XcsBXmE0LfGqvX7xosaQ07R/6DL3VMb+KR0Nc8QsJq39:C5epEQGiLKsaRxeVe0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks