General

  • Target

    fa6b0ecb75ccb53d9dfffcc205710255_JaffaCakes118

  • Size

    7.9MB

  • Sample

    240419-qxs9nsef91

  • MD5

    fa6b0ecb75ccb53d9dfffcc205710255

  • SHA1

    e11dcf82ab32e1c5096866f1242483a9b8457c7f

  • SHA256

    b7f0cc958b40e17f6f7825bffcf8deb6e69d64ba265c47b500e33642de5c420e

  • SHA512

    16826e3d68d3bb536b23bb7a1c944ae22477df3b4349aaaa8d8347f594a8b291bebf558a3e1d5105fe8b5b7310cc75e231e2a4727009e1d0df290b1fe8579b34

  • SSDEEP

    98304:9OzH+XBts1rX50JU8qB+TciBavxGYfVtYzGbAnMklK/5Xo+IFoNngx1FRh4EO9lN:9Or+XwBqcgUt+MpmQNshJOsK7

Malware Config

Extracted

Family

metasploit

Version

metasploit_stager

C2

0.0.0.0:0

Targets

    • Target

      fa6b0ecb75ccb53d9dfffcc205710255_JaffaCakes118

    • Size

      7.9MB

    • MD5

      fa6b0ecb75ccb53d9dfffcc205710255

    • SHA1

      e11dcf82ab32e1c5096866f1242483a9b8457c7f

    • SHA256

      b7f0cc958b40e17f6f7825bffcf8deb6e69d64ba265c47b500e33642de5c420e

    • SHA512

      16826e3d68d3bb536b23bb7a1c944ae22477df3b4349aaaa8d8347f594a8b291bebf558a3e1d5105fe8b5b7310cc75e231e2a4727009e1d0df290b1fe8579b34

    • SSDEEP

      98304:9OzH+XBts1rX50JU8qB+TciBavxGYfVtYzGbAnMklK/5Xo+IFoNngx1FRh4EO9lN:9Or+XwBqcgUt+MpmQNshJOsK7

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks