General

  • Target

    1a9b5e55bbe729fa18cb7fd48f3ebb61_JaffaCakes118

  • Size

    72KB

  • Sample

    240701-kd957a1gjf

  • MD5

    1a9b5e55bbe729fa18cb7fd48f3ebb61

  • SHA1

    4cfa032414f61e6515ad683c53e5f73a20e6c4a7

  • SHA256

    b7fe533df543162b12f7197b4c0e3442b039f53a62bff329697f964494ceab1c

  • SHA512

    f453adffc9677128e96d2163ec19997dd0ad4579c85d92a0684990ba2c798befb2ba732f3c7961d2cc98c9f3ec3a69698b5bc7f51540ff0af1a99946341d3e8a

  • SSDEEP

    1536:ItoztEKVVxyYIfoUuabLR3nV3lnhar+RMb+KR0Nc8QsJq39:HVx7613nV3BJRe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

10.0.2.15:4444

Targets

    • Target

      1a9b5e55bbe729fa18cb7fd48f3ebb61_JaffaCakes118

    • Size

      72KB

    • MD5

      1a9b5e55bbe729fa18cb7fd48f3ebb61

    • SHA1

      4cfa032414f61e6515ad683c53e5f73a20e6c4a7

    • SHA256

      b7fe533df543162b12f7197b4c0e3442b039f53a62bff329697f964494ceab1c

    • SHA512

      f453adffc9677128e96d2163ec19997dd0ad4579c85d92a0684990ba2c798befb2ba732f3c7961d2cc98c9f3ec3a69698b5bc7f51540ff0af1a99946341d3e8a

    • SSDEEP

      1536:ItoztEKVVxyYIfoUuabLR3nV3lnhar+RMb+KR0Nc8QsJq39:HVx7613nV3BJRe0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks