General

  • Target

    b09c41e44dbc22910fc0c3c1bd167c71_JaffaCakes118

  • Size

    448KB

  • Sample

    241129-merfksvnhn

  • MD5

    b09c41e44dbc22910fc0c3c1bd167c71

  • SHA1

    f7500685bc6516b411c591d4a724e749cf4f40d1

  • SHA256

    32d56d24579d6f391cca8f4e73b40d3f337305128bc157f79fecd441971ac7e9

  • SHA512

    03572a002463dbf0ba5c84c34494e9d289e81b2585f7605b48033742536db10ebbd3cdf72523d2876e8ec2f8ff6cf7f42bd9dc2e5a5fd5427bbcfa7b138813d4

  • SSDEEP

    12288:wLXmgMb4Xd+Uh8ggdE8Ox4GoyPV4qOr1nBMIQn6:wDmgMbVujg9u4GBPVLOr1nvM6

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.1.40:4444

Targets

    • Target

      b09c41e44dbc22910fc0c3c1bd167c71_JaffaCakes118

    • Size

      448KB

    • MD5

      b09c41e44dbc22910fc0c3c1bd167c71

    • SHA1

      f7500685bc6516b411c591d4a724e749cf4f40d1

    • SHA256

      32d56d24579d6f391cca8f4e73b40d3f337305128bc157f79fecd441971ac7e9

    • SHA512

      03572a002463dbf0ba5c84c34494e9d289e81b2585f7605b48033742536db10ebbd3cdf72523d2876e8ec2f8ff6cf7f42bd9dc2e5a5fd5427bbcfa7b138813d4

    • SSDEEP

      12288:wLXmgMb4Xd+Uh8ggdE8Ox4GoyPV4qOr1nBMIQn6:wDmgMbVujg9u4GBPVLOr1nvM6

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

MITRE ATT&CK Enterprise v15

Tasks