General

  • Target

    18384ad1f1b44f29c42384e7e8e191ec_JaffaCakes118

  • Size

    72KB

  • Sample

    240628-be39lasdme

  • MD5

    18384ad1f1b44f29c42384e7e8e191ec

  • SHA1

    ab046e2b10578963e1a7b9c96af4ed84ea7c5a66

  • SHA256

    1a67d12482dfdc41bca1678571af55e35c9c3cba72782ebbafccc9b0512f3c48

  • SHA512

    94b8168ea18999dfd9efee5df9962e34911a4c1751ea721136b61ebbd8a722a5070ca02952998acb5bd4826e697826119a5855d246982af91edd4a5f67905c00

  • SSDEEP

    1536:IIoRF7YX9pqVCJ2NybOG9lnmbO8wXmv5n0HDjnMb+KR0Nc8QsJq39:Q37Y3mlNySG9kOWv50HDjne0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

10.0.20.206:4416

Targets

    • Target

      18384ad1f1b44f29c42384e7e8e191ec_JaffaCakes118

    • Size

      72KB

    • MD5

      18384ad1f1b44f29c42384e7e8e191ec

    • SHA1

      ab046e2b10578963e1a7b9c96af4ed84ea7c5a66

    • SHA256

      1a67d12482dfdc41bca1678571af55e35c9c3cba72782ebbafccc9b0512f3c48

    • SHA512

      94b8168ea18999dfd9efee5df9962e34911a4c1751ea721136b61ebbd8a722a5070ca02952998acb5bd4826e697826119a5855d246982af91edd4a5f67905c00

    • SSDEEP

      1536:IIoRF7YX9pqVCJ2NybOG9lnmbO8wXmv5n0HDjnMb+KR0Nc8QsJq39:Q37Y3mlNySG9kOWv50HDjne0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks