General

  • Target

    f2390da7c61659da35a26d714f291615_JaffaCakes118

  • Size

    72KB

  • Sample

    240922-r4f4csvcjf

  • MD5

    f2390da7c61659da35a26d714f291615

  • SHA1

    0cad1a82bd3359e67a2cfec56de280983e1f38ef

  • SHA256

    64975d3236568f1da210fa7500526e72219def9ce2abcd1d6daca8a0a50dce37

  • SHA512

    a204fd9357ef1f8880e7bdc4c544fa7c8e7e2716c3ff53fa50d8f5dc544d6488f1fac4d8e4bc02e7eb2d8f265f3f8f60dba9314e6b101dd2a1811f75b3a9e0ef

  • SSDEEP

    1536:I3uMG7tsVxE3GxJ9ZXAlMB61Y2xhA/dIss3Mb+KR0Nc8QsJq39:Uuh3Grw2BDess3e0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.1.33:4444

Targets

    • Target

      f2390da7c61659da35a26d714f291615_JaffaCakes118

    • Size

      72KB

    • MD5

      f2390da7c61659da35a26d714f291615

    • SHA1

      0cad1a82bd3359e67a2cfec56de280983e1f38ef

    • SHA256

      64975d3236568f1da210fa7500526e72219def9ce2abcd1d6daca8a0a50dce37

    • SHA512

      a204fd9357ef1f8880e7bdc4c544fa7c8e7e2716c3ff53fa50d8f5dc544d6488f1fac4d8e4bc02e7eb2d8f265f3f8f60dba9314e6b101dd2a1811f75b3a9e0ef

    • SSDEEP

      1536:I3uMG7tsVxE3GxJ9ZXAlMB61Y2xhA/dIss3Mb+KR0Nc8QsJq39:Uuh3Grw2BDess3e0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks