General

  • Target

    dd54f9f03a5b41d9b52637d0128c1829_JaffaCakes118

  • Size

    34KB

  • Sample

    241210-gqps8svrhx

  • MD5

    dd54f9f03a5b41d9b52637d0128c1829

  • SHA1

    8e88facfef924f410ad393e25b3b29028475b7f2

  • SHA256

    abfe3fffb949e07b2fb651c5370764f0084f4f3a041528ec661f84e0f0e53652

  • SHA512

    cc5b9d4aff16c4e9e5ea99d85584f8c26f096c27f8a76b4f21f28f4d85fad7e8af7cae267df0d9c89d22edbf2285f8e76d858d4a311397c58aa60d880fa3a999

  • SSDEEP

    384:wpTNtkA/4CrIlbwGiJUyaTwz8akIDvwL5aFL9yakCt1+Ggzlu4keWoGzKjuGcvAi:MT7kA/FIlbkJzDvs5e04qzfk3yjbk

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      dd54f9f03a5b41d9b52637d0128c1829_JaffaCakes118

    • Size

      34KB

    • MD5

      dd54f9f03a5b41d9b52637d0128c1829

    • SHA1

      8e88facfef924f410ad393e25b3b29028475b7f2

    • SHA256

      abfe3fffb949e07b2fb651c5370764f0084f4f3a041528ec661f84e0f0e53652

    • SHA512

      cc5b9d4aff16c4e9e5ea99d85584f8c26f096c27f8a76b4f21f28f4d85fad7e8af7cae267df0d9c89d22edbf2285f8e76d858d4a311397c58aa60d880fa3a999

    • SSDEEP

      384:wpTNtkA/4CrIlbwGiJUyaTwz8akIDvwL5aFL9yakCt1+Ggzlu4keWoGzKjuGcvAi:MT7kA/FIlbkJzDvs5e04qzfk3yjbk

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

MITRE ATT&CK Enterprise v15

Tasks