General

  • Target

    a3bbbe9e9401e7d24515763d2965bba4_JaffaCakes118

  • Size

    205KB

  • Sample

    241126-x86gpssmdj

  • MD5

    a3bbbe9e9401e7d24515763d2965bba4

  • SHA1

    83a4c1bc08873eef80e01fadbb86263320ea9d55

  • SHA256

    badb47ff420a16dd65416ede331db470546a99b59aaa27dbb869057b13c5e2aa

  • SHA512

    e460187229aaf9ae380044e8d786a1e50b164fc2bc5e5790d06fa518222b04a735934af17f46a897b2b21e30a45bfdd52e5c4ffa299e8b0627e4438ec82a6dcf

  • SSDEEP

    6144:n/mfPy+AIQNicESWCLvOKORQeYE8C27seR2CasrYfUMht:nefaJICiaWCLG7vI3ANCXpS

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

92.253.102.95:443

Targets

    • Target

      a3bbbe9e9401e7d24515763d2965bba4_JaffaCakes118

    • Size

      205KB

    • MD5

      a3bbbe9e9401e7d24515763d2965bba4

    • SHA1

      83a4c1bc08873eef80e01fadbb86263320ea9d55

    • SHA256

      badb47ff420a16dd65416ede331db470546a99b59aaa27dbb869057b13c5e2aa

    • SHA512

      e460187229aaf9ae380044e8d786a1e50b164fc2bc5e5790d06fa518222b04a735934af17f46a897b2b21e30a45bfdd52e5c4ffa299e8b0627e4438ec82a6dcf

    • SSDEEP

      6144:n/mfPy+AIQNicESWCLvOKORQeYE8C27seR2CasrYfUMht:nefaJICiaWCLG7vI3ANCXpS

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks