General

  • Target

    f47ed88c7cac304d42a08cfea178b36a_JaffaCakes118

  • Size

    47KB

  • Sample

    240924-zv3vrsyclh

  • MD5

    f47ed88c7cac304d42a08cfea178b36a

  • SHA1

    639e638c48c914c6101e5fa36f87737db4240503

  • SHA256

    bd533800194553888d05c5a560cce3940db886df82a5f895b0b321b7c4d9e5ff

  • SHA512

    4a1ddc887e504cb84dc247a518fe1d214e86533caeec6a993ce97056070528425f136d56c257650e2162599c277697edea3fd9626cdbbf4cd1bcab0215e4d2de

  • SSDEEP

    768:IucKNIJtze/3yZgWq4VesAv+ig4GpzZ3a9OMM1tEdOaeAJ95RZMB4jRPrOHcJ5PI:Iuc3tzc+re+WGp1aAj6wj85RZmwPrmWI

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.0.110:4444

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Targets

    • Target

      f47ed88c7cac304d42a08cfea178b36a_JaffaCakes118

    • Size

      47KB

    • MD5

      f47ed88c7cac304d42a08cfea178b36a

    • SHA1

      639e638c48c914c6101e5fa36f87737db4240503

    • SHA256

      bd533800194553888d05c5a560cce3940db886df82a5f895b0b321b7c4d9e5ff

    • SHA512

      4a1ddc887e504cb84dc247a518fe1d214e86533caeec6a993ce97056070528425f136d56c257650e2162599c277697edea3fd9626cdbbf4cd1bcab0215e4d2de

    • SSDEEP

      768:IucKNIJtze/3yZgWq4VesAv+ig4GpzZ3a9OMM1tEdOaeAJ95RZMB4jRPrOHcJ5PI:Iuc3tzc+re+WGp1aAj6wj85RZmwPrmWI

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks