General

  • Target

    9a9292d53ae7270d7ae6b18296c9d05a_JaffaCakes118

  • Size

    72KB

  • Sample

    241125-k8lq3szjct

  • MD5

    9a9292d53ae7270d7ae6b18296c9d05a

  • SHA1

    5c82a1e100b93750b4635b9619f759732d0c3147

  • SHA256

    db10b1ed080fc00e5c8ff5a480bdf3253631ab13b64f1114e4157897c5212cf1

  • SHA512

    aadda5c7ebcaba13a1b32c7a8ffa5458036c7bca61942b90c57a3c2430e11203c3d31d24d3115125da714ae36f27ace92251aa7bfaa2a34a05b47322a3ebba99

  • SSDEEP

    1536:ITtS8byasS9wbmIf0Ic7+cQBqkD8hNZPxMb+KR0Nc8QsJq39:i8WEywt2jExDUNZPxe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.3.128:12345

Targets

    • Target

      9a9292d53ae7270d7ae6b18296c9d05a_JaffaCakes118

    • Size

      72KB

    • MD5

      9a9292d53ae7270d7ae6b18296c9d05a

    • SHA1

      5c82a1e100b93750b4635b9619f759732d0c3147

    • SHA256

      db10b1ed080fc00e5c8ff5a480bdf3253631ab13b64f1114e4157897c5212cf1

    • SHA512

      aadda5c7ebcaba13a1b32c7a8ffa5458036c7bca61942b90c57a3c2430e11203c3d31d24d3115125da714ae36f27ace92251aa7bfaa2a34a05b47322a3ebba99

    • SSDEEP

      1536:ITtS8byasS9wbmIf0Ic7+cQBqkD8hNZPxMb+KR0Nc8QsJq39:i8WEywt2jExDUNZPxe0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

MITRE ATT&CK Enterprise v15

Tasks