General

  • Target

    303f486490b099a40f8786abd53fb7f8_JaffaCakes118

  • Size

    195KB

  • Sample

    240510-v5hv5acc42

  • MD5

    303f486490b099a40f8786abd53fb7f8

  • SHA1

    fb834998ffd0a056fc435270702609f66bf5b377

  • SHA256

    b8a1ecdac45c0d6c815cc70031cb0549b3a8a4dec7adeb8b1e216549e52cbaa9

  • SHA512

    eb3a1409ca7492a13a516016cc9b3a95cbc09ff9805432c75f3b4f4bb61855d1471ec56c6569eec459b1cb90658822574be74954615bfd7df8945807cdd4f7cb

  • SSDEEP

    6144:TdTg+9TSueE1+lyrgIOU243CXlWzcYtZaPN:NgO+lUb2DX2Z6N

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.2.81:4444

Targets

    • Target

      303f486490b099a40f8786abd53fb7f8_JaffaCakes118

    • Size

      195KB

    • MD5

      303f486490b099a40f8786abd53fb7f8

    • SHA1

      fb834998ffd0a056fc435270702609f66bf5b377

    • SHA256

      b8a1ecdac45c0d6c815cc70031cb0549b3a8a4dec7adeb8b1e216549e52cbaa9

    • SHA512

      eb3a1409ca7492a13a516016cc9b3a95cbc09ff9805432c75f3b4f4bb61855d1471ec56c6569eec459b1cb90658822574be74954615bfd7df8945807cdd4f7cb

    • SSDEEP

      6144:TdTg+9TSueE1+lyrgIOU243CXlWzcYtZaPN:NgO+lUb2DX2Z6N

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks