General

  • Target

    93b4da70675889d573bed8898be092f8_JaffaCakes118

  • Size

    72KB

  • Sample

    241124-k1cs7ssray

  • MD5

    93b4da70675889d573bed8898be092f8

  • SHA1

    4c388522d81e099a596dd3d0d6b84ac599b3cc14

  • SHA256

    b1db101e9fbcec06b28abd2cc95ff524fa4bd5436cf1739df12bfeafc195ccaf

  • SHA512

    e110dcd32f59066ef3c019f68b7b5b3e6ab73a918c0f15c32de726e994b96b181445a24e724a09a94ba07d15534f4fcf11de7baa3f852e0a7004e15c20af6756

  • SSDEEP

    1536:IUvpYMnl3+22bIOcxkq+tsjyOuPSgxKeWaxMb+KR0Nc8QsJq39:xe7HU1+t5FPLkeWaxe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/fnstenv_mov

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.1.39:25534

Targets

    • Target

      93b4da70675889d573bed8898be092f8_JaffaCakes118

    • Size

      72KB

    • MD5

      93b4da70675889d573bed8898be092f8

    • SHA1

      4c388522d81e099a596dd3d0d6b84ac599b3cc14

    • SHA256

      b1db101e9fbcec06b28abd2cc95ff524fa4bd5436cf1739df12bfeafc195ccaf

    • SHA512

      e110dcd32f59066ef3c019f68b7b5b3e6ab73a918c0f15c32de726e994b96b181445a24e724a09a94ba07d15534f4fcf11de7baa3f852e0a7004e15c20af6756

    • SSDEEP

      1536:IUvpYMnl3+22bIOcxkq+tsjyOuPSgxKeWaxMb+KR0Nc8QsJq39:xe7HU1+t5FPLkeWaxe0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

MITRE ATT&CK Enterprise v15

Tasks