General

  • Target

    f40bce27ef9a2284436cf94b78364c34_JaffaCakes118

  • Size

    217KB

  • Sample

    241215-pxmlfstrcv

  • MD5

    f40bce27ef9a2284436cf94b78364c34

  • SHA1

    1e9c390fb5c7ea0b895e98d5661e931f624abf33

  • SHA256

    a6abb8dca3a1e78e739c30a8a35528e8b37f574eac29ac4fba937ad4f7397689

  • SHA512

    e2c9b75ba45e117978c954970f8a08bcea54ccd3b39ada2a917cac7832d28cd325665e0e3f3efe30a945deec0702421a5d130f0e594c923a773e768963dff1d4

  • SSDEEP

    3072:YqpPWVkP2hxNWX0nho7utD98Tyjgm+VvQiv+4ZtyXBDeCTLOI9o:VhWVk+xNvho7ut5NjOvsD5L1

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.2.15:443

Targets

    • Target

      f40bce27ef9a2284436cf94b78364c34_JaffaCakes118

    • Size

      217KB

    • MD5

      f40bce27ef9a2284436cf94b78364c34

    • SHA1

      1e9c390fb5c7ea0b895e98d5661e931f624abf33

    • SHA256

      a6abb8dca3a1e78e739c30a8a35528e8b37f574eac29ac4fba937ad4f7397689

    • SHA512

      e2c9b75ba45e117978c954970f8a08bcea54ccd3b39ada2a917cac7832d28cd325665e0e3f3efe30a945deec0702421a5d130f0e594c923a773e768963dff1d4

    • SSDEEP

      3072:YqpPWVkP2hxNWX0nho7utD98Tyjgm+VvQiv+4ZtyXBDeCTLOI9o:VhWVk+xNvho7ut5NjOvsD5L1

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

MITRE ATT&CK Enterprise v15

Tasks