General

  • Target

    c0d644a9ef85c6c7a37f76ca4b1b0042_JaffaCakes118

  • Size

    72KB

  • Sample

    241204-e8epwasles

  • MD5

    c0d644a9ef85c6c7a37f76ca4b1b0042

  • SHA1

    d6b0b8ad7b87e9da83ab4ea41fc63f7fe24e0ac6

  • SHA256

    b92cd9ddd87bf796d5f2c95173a85ac7b9eeb535cc8017e3cdc8700c4e63602a

  • SHA512

    14d903f9f64012d0457597f4a9e584bd75d1749ca9317722e7e60d2d163f13c411728b789ba5b6b24912dbf0c20ff939e04bd9a9f6d921d1a7de314b94703bd2

  • SSDEEP

    1536:IQZUgXS+8/OulX0SGerkWxNEeSikfMLMb+KR0Nc8QsJq39:WgXS+u1OWlEfMLe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.2.35:4444

Targets

    • Target

      c0d644a9ef85c6c7a37f76ca4b1b0042_JaffaCakes118

    • Size

      72KB

    • MD5

      c0d644a9ef85c6c7a37f76ca4b1b0042

    • SHA1

      d6b0b8ad7b87e9da83ab4ea41fc63f7fe24e0ac6

    • SHA256

      b92cd9ddd87bf796d5f2c95173a85ac7b9eeb535cc8017e3cdc8700c4e63602a

    • SHA512

      14d903f9f64012d0457597f4a9e584bd75d1749ca9317722e7e60d2d163f13c411728b789ba5b6b24912dbf0c20ff939e04bd9a9f6d921d1a7de314b94703bd2

    • SSDEEP

      1536:IQZUgXS+8/OulX0SGerkWxNEeSikfMLMb+KR0Nc8QsJq39:WgXS+u1OWlEfMLe0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

MITRE ATT&CK Enterprise v15

Tasks