General

  • Target

    1b0fa55f474f692ecd420297b0abe750_JaffaCakes118

  • Size

    42KB

  • Sample

    240506-gj5k4sbd6v

  • MD5

    1b0fa55f474f692ecd420297b0abe750

  • SHA1

    8680eeb1424464ef8c138533c408f1f05a914e20

  • SHA256

    b3db745668a1b882a48a6f5f97f3524f6b31114f138edb182b2894303f425288

  • SHA512

    a1cc0b1ac222dab63cfabdde813d9d8eb18efb759f0e815287e441812b4eb72975c4eef95a59cf14efd71b4d971d5569c894f7a7c74c30f5f6d97e8c989d87bc

  • SSDEEP

    768:LpF/51SYsxgO3uLRU9a0TXKxXFrbKTdyrgYrHAf0R6CNxwNqla:dF/51SjteLRCaWAV3SdxoHADmWNd

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_http

C2

http://79.131.106.35:4443/p6-554zfUv74CfkIow8KNAF8plvlnNQjzVTtInW-l2IgliMjYhITaPECiUyr54ABKKUdRhCdNpRVLh_Vqi_zYCXORWU4Yj5wyczYFirrwehVu3WDq8t-5oirmGBVwOZWtsF56TBJl3e4i5WR-hkNc8JENWhjDVBjCoS5DcBRiJVWmybvPloFIEhABIVCJsOsKuTnr0QqRejxiisy8l8XRYsYwajFkPdjkAebwGbwJPZp7U6

Targets

    • Target

      lol.exe

    • Size

      72KB

    • MD5

      e135fa9a71dec3a960c3d731d1645177

    • SHA1

      c5db1787485a285cfbea66c0c392352aecea7f65

    • SHA256

      95a2dfc7b16a6017ecd82f6acd368ccbdd3a932ac4168cadbe9676ec9f537d67

    • SHA512

      a46984478e5267c7704ad93e4354baea9bcafc0a3f231334e5e0b5a68e3458d931b9f3ebcc1098b04ac092ed5335456eb8a3a1160ead2ba5bbc6030abdb2924b

    • SSDEEP

      1536:IBq3u01QQTN4mhggQhoNOcgK3CuscMFMb+KR0Nc8QsJq39:P+02Q6mhVQhPcn+VFe0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks