General

  • Target

    3dc87c1cbb5c484863385f55d93f3401_JaffaCakes118

  • Size

    12KB

  • Sample

    241013-e2erastbll

  • MD5

    3dc87c1cbb5c484863385f55d93f3401

  • SHA1

    57ef8bbeed46d8bd08051255f7bdf2faba5e7da0

  • SHA256

    89bdd419c716cdc829e9ad5a27c150ec456955792cadd85f7abe6236a53e0736

  • SHA512

    386b8848c4ec1ba0b973b2ea66ccb35505927f78495225b602919735c0ac823d0f0796a76d70d9d664f9fad48db0415a780dbf96f968e8f3f2ff082ceea5bba0

  • SSDEEP

    96:c1gGEiy7XiOQyG6E8RVMhfBCwEq/1HZmwIIyVOjF44eP6T25iHSuIclU3PCPxMeC:cmQyrwzkgZxyoe3PCPxMpEAOHRHI

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.137.238:12000

Targets

    • Target

      3dc87c1cbb5c484863385f55d93f3401_JaffaCakes118

    • Size

      12KB

    • MD5

      3dc87c1cbb5c484863385f55d93f3401

    • SHA1

      57ef8bbeed46d8bd08051255f7bdf2faba5e7da0

    • SHA256

      89bdd419c716cdc829e9ad5a27c150ec456955792cadd85f7abe6236a53e0736

    • SHA512

      386b8848c4ec1ba0b973b2ea66ccb35505927f78495225b602919735c0ac823d0f0796a76d70d9d664f9fad48db0415a780dbf96f968e8f3f2ff082ceea5bba0

    • SSDEEP

      96:c1gGEiy7XiOQyG6E8RVMhfBCwEq/1HZmwIIyVOjF44eP6T25iHSuIclU3PCPxMeC:cmQyrwzkgZxyoe3PCPxMpEAOHRHI

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks