General

  • Target

    14c613eacb7f9c1835b80ab6348ff6c3_JaffaCakes118

  • Size

    205KB

  • Sample

    240627-fq5c9atdnd

  • MD5

    14c613eacb7f9c1835b80ab6348ff6c3

  • SHA1

    b42865b06cdcb6a989fa416ff81591a71f0f58dd

  • SHA256

    53de1c650ac0cb007b3b4200d7b67ee885efd3ca5fb835930f510a0475c5f4c2

  • SHA512

    85afa5c4d5c7535f5b37c628d87146983914e19fee549f0eb5de60641f73b3b6efcee36bf2387b966f02a57e8e39622ff9738e873c8d1a283f931aecf8e62ab6

  • SSDEEP

    6144:tWGB1mSxXmVmXPCITMxG4yYOLW//RpbymQGm1HnYl0QM:EOTXsmXPCdG4fq4/zymQGyHnYy

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.172.252:443

Targets

    • Target

      14c613eacb7f9c1835b80ab6348ff6c3_JaffaCakes118

    • Size

      205KB

    • MD5

      14c613eacb7f9c1835b80ab6348ff6c3

    • SHA1

      b42865b06cdcb6a989fa416ff81591a71f0f58dd

    • SHA256

      53de1c650ac0cb007b3b4200d7b67ee885efd3ca5fb835930f510a0475c5f4c2

    • SHA512

      85afa5c4d5c7535f5b37c628d87146983914e19fee549f0eb5de60641f73b3b6efcee36bf2387b966f02a57e8e39622ff9738e873c8d1a283f931aecf8e62ab6

    • SSDEEP

      6144:tWGB1mSxXmVmXPCITMxG4yYOLW//RpbymQGm1HnYl0QM:EOTXsmXPCdG4fq4/zymQGyHnYy

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks