General

  • Target

    13e01575ce231f9d42bc2b6a96a3a8ad_JaffaCakes118

  • Size

    72KB

  • Sample

    240626-3ffngashjl

  • MD5

    13e01575ce231f9d42bc2b6a96a3a8ad

  • SHA1

    6d0d97973c6bd675f32c07fefff1bcc192a96bb4

  • SHA256

    01078c89a07efb9f7f8e36fdf0a3e3f5982393e98bd2db191254cd75495f2046

  • SHA512

    3b9e60572b1d431b142e188cc28c9025ebb0db368997a218224a4aa0aa7c0fdf3bb6f5c524ec3e0cc09b6ba6c5027dfb841ce2f6e7e9092cde18030100e252be

  • SSDEEP

    1536:IYDO9xKZeTDMQ2Ez8vgsT0TGZkQvMb+KR0Nc8QsJq39:ZDO9bLovgs0ue0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.1.50:4444

Targets

    • Target

      13e01575ce231f9d42bc2b6a96a3a8ad_JaffaCakes118

    • Size

      72KB

    • MD5

      13e01575ce231f9d42bc2b6a96a3a8ad

    • SHA1

      6d0d97973c6bd675f32c07fefff1bcc192a96bb4

    • SHA256

      01078c89a07efb9f7f8e36fdf0a3e3f5982393e98bd2db191254cd75495f2046

    • SHA512

      3b9e60572b1d431b142e188cc28c9025ebb0db368997a218224a4aa0aa7c0fdf3bb6f5c524ec3e0cc09b6ba6c5027dfb841ce2f6e7e9092cde18030100e252be

    • SSDEEP

      1536:IYDO9xKZeTDMQ2Ez8vgsT0TGZkQvMb+KR0Nc8QsJq39:ZDO9bLovgs0ue0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks