General

  • Target

    18ea816697381eeb6250fdf1f07cfa69_JaffaCakes118

  • Size

    72KB

  • Sample

    240628-fzjg5swaqr

  • MD5

    18ea816697381eeb6250fdf1f07cfa69

  • SHA1

    35f0ec7f85a95102a860b0285088cc22be18488f

  • SHA256

    256b1358e2a0ac0832c5124a7d8c092e579b4f81008412c1bb23d45b3839af58

  • SHA512

    de8daf7b3487eddd14f651ef9d68ac7fbba4bb0684096cb8decd81245db1fd20a23bbbb71aab6dab9a85415402aa6937b315af30570712c098d435883f66d8f9

  • SSDEEP

    1536:IhJW6W+53lRXEMIuq0+q7XuuwsuLgw3XZnMb+KR0Nc8Qs:oW6W+7RXEMIufRquwsOb3X9e0Nc8Qs

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.1.101:8000

Targets

    • Target

      18ea816697381eeb6250fdf1f07cfa69_JaffaCakes118

    • Size

      72KB

    • MD5

      18ea816697381eeb6250fdf1f07cfa69

    • SHA1

      35f0ec7f85a95102a860b0285088cc22be18488f

    • SHA256

      256b1358e2a0ac0832c5124a7d8c092e579b4f81008412c1bb23d45b3839af58

    • SHA512

      de8daf7b3487eddd14f651ef9d68ac7fbba4bb0684096cb8decd81245db1fd20a23bbbb71aab6dab9a85415402aa6937b315af30570712c098d435883f66d8f9

    • SSDEEP

      1536:IhJW6W+53lRXEMIuq0+q7XuuwsuLgw3XZnMb+KR0Nc8Qs:oW6W+7RXEMIufRquwsOb3X9e0Nc8Qs

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks