General

  • Target

    1b609377f8b4b72238a8b8167cc74345_JaffaCakes118

  • Size

    72KB

  • Sample

    240701-p5pe1ssfnc

  • MD5

    1b609377f8b4b72238a8b8167cc74345

  • SHA1

    ab6cf4f9641611264a5be1bf34efe6ed49e2679b

  • SHA256

    92290837988f69250bffb4aae66a046e30d5fafa279f0d0f7279e200e5707397

  • SHA512

    df89655fc7d62b4f1bb1a1ed3d98dd235994e1ecff2a1031ffdc8f8b2786c73c9fe811853fcf1b0990ad0a9999e13a22dd33e849e4e32fa4ca6a2bb76c6c7076

  • SSDEEP

    1536:IA6OEBeuqh1qzNpmlGrbD4z8FhQORcgJmebOGXguKMb+KR0Nc8QsJq39:QzBKqUY3DK8rQwcgQebOGCe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.1.19:4444

Targets

    • Target

      1b609377f8b4b72238a8b8167cc74345_JaffaCakes118

    • Size

      72KB

    • MD5

      1b609377f8b4b72238a8b8167cc74345

    • SHA1

      ab6cf4f9641611264a5be1bf34efe6ed49e2679b

    • SHA256

      92290837988f69250bffb4aae66a046e30d5fafa279f0d0f7279e200e5707397

    • SHA512

      df89655fc7d62b4f1bb1a1ed3d98dd235994e1ecff2a1031ffdc8f8b2786c73c9fe811853fcf1b0990ad0a9999e13a22dd33e849e4e32fa4ca6a2bb76c6c7076

    • SSDEEP

      1536:IA6OEBeuqh1qzNpmlGrbD4z8FhQORcgJmebOGXguKMb+KR0Nc8QsJq39:QzBKqUY3DK8rQwcgQebOGCe0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks