General

  • Target

    ef112ec37deca337132451fb3e7cb496_JaffaCakes118

  • Size

    46KB

  • Sample

    240921-e3y7bsveqb

  • MD5

    ef112ec37deca337132451fb3e7cb496

  • SHA1

    6aa8a8611063988b96fd963d007d47d13d4e7db3

  • SHA256

    56b75ab0acc25b3593dc6d3abf56413d3386278aeeadddfa0c741715425e8656

  • SHA512

    4a477a6d0682e62cd0184952360c7e78f8ca119e910013e608b0d2b076f61ba5620d5aa9369dc75e1639015ef8ef90b4fe89a9c01233998db12677942e3caebd

  • SSDEEP

    768:IOSBSkNXxcpJlBW/QUOwyc6oC/4U91Nidxh9iYZtMmPZ/+4xH2DQkdHgZq3:IOSBzdx+rBtPoDUdidxhkYbMOxH2Aq3

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.1.202:4444

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Targets

    • Target

      ef112ec37deca337132451fb3e7cb496_JaffaCakes118

    • Size

      46KB

    • MD5

      ef112ec37deca337132451fb3e7cb496

    • SHA1

      6aa8a8611063988b96fd963d007d47d13d4e7db3

    • SHA256

      56b75ab0acc25b3593dc6d3abf56413d3386278aeeadddfa0c741715425e8656

    • SHA512

      4a477a6d0682e62cd0184952360c7e78f8ca119e910013e608b0d2b076f61ba5620d5aa9369dc75e1639015ef8ef90b4fe89a9c01233998db12677942e3caebd

    • SSDEEP

      768:IOSBSkNXxcpJlBW/QUOwyc6oC/4U91Nidxh9iYZtMmPZ/+4xH2DQkdHgZq3:IOSBzdx+rBtPoDUdidxhkYbMOxH2Aq3

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks