General

  • Target

    a83e661b2d935a1a88384e284abacbd1_JaffaCakes118

  • Size

    72KB

  • Sample

    241127-rme5qstjhk

  • MD5

    a83e661b2d935a1a88384e284abacbd1

  • SHA1

    7515e398d218cea9c3fb616d4584d31d7b07918e

  • SHA256

    bd122a2ce83a0e6e314c53a356f07a0f3b68b2424ae98f9d89361899761ab3d1

  • SHA512

    4e5fc9aeae9aada64414f227fc15283d51cfb297aa481a42513704ba8b32abb433dc0e5fbe5721269da7d6b06b022b690023e9cf5be85feef770333b53f1120b

  • SSDEEP

    1536:IEWM+lGC8aZnbWMaVk9PGYlqMb+KR0Nc8QsJq39:+GCDRaV8Dlqe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.1.112:4444

Targets

    • Target

      a83e661b2d935a1a88384e284abacbd1_JaffaCakes118

    • Size

      72KB

    • MD5

      a83e661b2d935a1a88384e284abacbd1

    • SHA1

      7515e398d218cea9c3fb616d4584d31d7b07918e

    • SHA256

      bd122a2ce83a0e6e314c53a356f07a0f3b68b2424ae98f9d89361899761ab3d1

    • SHA512

      4e5fc9aeae9aada64414f227fc15283d51cfb297aa481a42513704ba8b32abb433dc0e5fbe5721269da7d6b06b022b690023e9cf5be85feef770333b53f1120b

    • SSDEEP

      1536:IEWM+lGC8aZnbWMaVk9PGYlqMb+KR0Nc8QsJq39:+GCDRaV8Dlqe0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

MITRE ATT&CK Enterprise v15

Tasks