General

  • Target

    f5aa8a38f61d97d7e96d33fdc06b88c5_JaffaCakes118

  • Size

    45KB

  • Sample

    240417-nlntpsdc75

  • MD5

    f5aa8a38f61d97d7e96d33fdc06b88c5

  • SHA1

    579428f6eedc1201f5f88114b4b95ad7fcc7bdd0

  • SHA256

    aad1e7a3c29b0344fbbeae9efa4a4799dab522b3d4a9bcd111c9808c125de581

  • SHA512

    b57976bb257884a2b22a284c8368e084d8f75579465f9bce4f4daa53eb6743ce005764083a130c142771c66b41e92d76bd2e6c5a593e3ca79fb06d659d8d07e5

  • SSDEEP

    768:IOZgcRDRvzBWZt2PIUVwbSta0gl0cX+xynielsQFU6hnFgc65EI/0m/MDedLq3:IOecR9atMu+ta0gl0cXASZvO5EaLyeJI

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.1.2:6666

Targets

    • Target

      f5aa8a38f61d97d7e96d33fdc06b88c5_JaffaCakes118

    • Size

      45KB

    • MD5

      f5aa8a38f61d97d7e96d33fdc06b88c5

    • SHA1

      579428f6eedc1201f5f88114b4b95ad7fcc7bdd0

    • SHA256

      aad1e7a3c29b0344fbbeae9efa4a4799dab522b3d4a9bcd111c9808c125de581

    • SHA512

      b57976bb257884a2b22a284c8368e084d8f75579465f9bce4f4daa53eb6743ce005764083a130c142771c66b41e92d76bd2e6c5a593e3ca79fb06d659d8d07e5

    • SSDEEP

      768:IOZgcRDRvzBWZt2PIUVwbSta0gl0cX+xynielsQFU6hnFgc65EI/0m/MDedLq3:IOecR9atMu+ta0gl0cXASZvO5EaLyeJI

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks