General

  • Target

    d12e0f793229d0750fcc6e583c88b97a_JaffaCakes118

  • Size

    99KB

  • Sample

    241207-hsl1ss1pax

  • MD5

    d12e0f793229d0750fcc6e583c88b97a

  • SHA1

    c67f59e02ee7ad71abc42b630fd0ded8c9d315bf

  • SHA256

    e1e8a7e7079dddb7607788de5416d2cb7f4d39e54c4432e231070770951f5fe2

  • SHA512

    dc4855aff4975dca636ae32ece59aaa4fab39689cb50bd57255ba2e424589b733531fbb46edc5fee0990fea865c865eba62dd28527a0f420c9d03a6477fa2ff4

  • SSDEEP

    1536:hrKv01fdG91bG1hQiUFsP5ND0N04dAZzu3q2OWbp1wIRU40vQpyQ:hrKv01fdG99oWa5404+IRUS

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

10.19.93.200:4444

Targets

    • Target

      d12e0f793229d0750fcc6e583c88b97a_JaffaCakes118

    • Size

      99KB

    • MD5

      d12e0f793229d0750fcc6e583c88b97a

    • SHA1

      c67f59e02ee7ad71abc42b630fd0ded8c9d315bf

    • SHA256

      e1e8a7e7079dddb7607788de5416d2cb7f4d39e54c4432e231070770951f5fe2

    • SHA512

      dc4855aff4975dca636ae32ece59aaa4fab39689cb50bd57255ba2e424589b733531fbb46edc5fee0990fea865c865eba62dd28527a0f420c9d03a6477fa2ff4

    • SSDEEP

      1536:hrKv01fdG91bG1hQiUFsP5ND0N04dAZzu3q2OWbp1wIRU40vQpyQ:hrKv01fdG99oWa5404+IRUS

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

MITRE ATT&CK Enterprise v15

Tasks