General

  • Target

    28492c4b9e930f3481aa0b4bdd83e426_JaffaCakes118

  • Size

    36KB

  • Sample

    240509-ezlrtsdc66

  • MD5

    28492c4b9e930f3481aa0b4bdd83e426

  • SHA1

    8a5be3d55dec71c065cc5aab08468e34005f67cb

  • SHA256

    6eade15ad0d8466657d14635517d5bbfe161e19e3133904a828cfdb5bab41e47

  • SHA512

    46ea4ae081bc7c5026c8123f004fc82846629d216c2e8ccedc87290ef97dce752639676e14fbe897b5ba0fe2535fabc9c7ffc3f39e1efff98c5fc352af2d0b39

  • SSDEEP

    768:bck3hOdsylKlgryzc4bNhZFGzE+cL2knAJiOiC6GNfM+pwqTfxIs:Qk3hOdsylKlgryzc4bNhZFGzE+cL2knt

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

10.196.20.185:4418

Targets

    • Target

      28492c4b9e930f3481aa0b4bdd83e426_JaffaCakes118

    • Size

      36KB

    • MD5

      28492c4b9e930f3481aa0b4bdd83e426

    • SHA1

      8a5be3d55dec71c065cc5aab08468e34005f67cb

    • SHA256

      6eade15ad0d8466657d14635517d5bbfe161e19e3133904a828cfdb5bab41e47

    • SHA512

      46ea4ae081bc7c5026c8123f004fc82846629d216c2e8ccedc87290ef97dce752639676e14fbe897b5ba0fe2535fabc9c7ffc3f39e1efff98c5fc352af2d0b39

    • SSDEEP

      768:bck3hOdsylKlgryzc4bNhZFGzE+cL2knAJiOiC6GNfM+pwqTfxIs:Qk3hOdsylKlgryzc4bNhZFGzE+cL2knt

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Process spawned suspicious child process

      This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

MITRE ATT&CK Enterprise v15

Tasks