General

  • Target

    8e2f3088c8d290bcc97542f2cabc807c_JaffaCakes118

  • Size

    205KB

  • Sample

    241104-aftk4s1khr

  • MD5

    8e2f3088c8d290bcc97542f2cabc807c

  • SHA1

    c35a59018490ba1d3bf2bff97232221f7ba37544

  • SHA256

    a04c8fbfae355c0d6f5b92b086aa90ed9986ae8ba9201e06085c97b6319ced1f

  • SHA512

    cbe272b7e7dfca84a3b04c1f041cd4ac82f1d5708396406ccdf98cc9f9a65b526e56e07dd5b60b3b55db9fbd67e3080a139d4bc4f8a3db21aee5826af1ba600e

  • SSDEEP

    3072:K0DpylZW0k8aJh6o3H7cQMACKVuerYK2sb7UXhFR3fKeP/q:RDH8c6oLymVKf/

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Targets

    • Target

      8e2f3088c8d290bcc97542f2cabc807c_JaffaCakes118

    • Size

      205KB

    • MD5

      8e2f3088c8d290bcc97542f2cabc807c

    • SHA1

      c35a59018490ba1d3bf2bff97232221f7ba37544

    • SHA256

      a04c8fbfae355c0d6f5b92b086aa90ed9986ae8ba9201e06085c97b6319ced1f

    • SHA512

      cbe272b7e7dfca84a3b04c1f041cd4ac82f1d5708396406ccdf98cc9f9a65b526e56e07dd5b60b3b55db9fbd67e3080a139d4bc4f8a3db21aee5826af1ba600e

    • SSDEEP

      3072:K0DpylZW0k8aJh6o3H7cQMACKVuerYK2sb7UXhFR3fKeP/q:RDH8c6oLymVKf/

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks