General

  • Target

    f437b61c12f48470d35a1504de3b4d97_JaffaCakes118

  • Size

    72KB

  • Sample

    240924-wpy3vazhlg

  • MD5

    f437b61c12f48470d35a1504de3b4d97

  • SHA1

    71dbfc31c432d3bbf3e68e48025dc65734939435

  • SHA256

    16306beaf3d1b815a7e6ff98ed4bb99bf74ff4b39615e673f7d9c281cd561280

  • SHA512

    13a482867376631fd5779e12322ad0753c6a3a50912b3f6f3b3f427af36f3ec1869c041ddd4bfd7a6c72590031b06d98fe42f72e206ddbac95db1e6101b49955

  • SSDEEP

    1536:IKDBQVFgcMR0lmZPsO9FWjZyIMb+KR0Nc8QsJq3:3BsKR0lmZPsOTije0Nc8QsC

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.1.12:4444

Targets

    • Target

      f437b61c12f48470d35a1504de3b4d97_JaffaCakes118

    • Size

      72KB

    • MD5

      f437b61c12f48470d35a1504de3b4d97

    • SHA1

      71dbfc31c432d3bbf3e68e48025dc65734939435

    • SHA256

      16306beaf3d1b815a7e6ff98ed4bb99bf74ff4b39615e673f7d9c281cd561280

    • SHA512

      13a482867376631fd5779e12322ad0753c6a3a50912b3f6f3b3f427af36f3ec1869c041ddd4bfd7a6c72590031b06d98fe42f72e206ddbac95db1e6101b49955

    • SSDEEP

      1536:IKDBQVFgcMR0lmZPsO9FWjZyIMb+KR0Nc8QsJq3:3BsKR0lmZPsOTije0Nc8QsC

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks