General

  • Target

    30ca59fd19f2ea733110d47eaa28df03_JaffaCakes118

  • Size

    102KB

  • Sample

    240510-ypzeqahg75

  • MD5

    30ca59fd19f2ea733110d47eaa28df03

  • SHA1

    d805e91b13b5b78fe32c4f52df6d181b592456ae

  • SHA256

    005010be1f9a0bd4cbaabce829c6fe1f13649dfcfd050458d171d6ee2714470a

  • SHA512

    37cd95d34e90c7a5ec97ce90e47d50aab99195681be9c5ad483b360addd09b894dc5ca4cc5c9fcc5073ba3f7a3e6f9485ba3879ee5df0e71a6d22d0822b1ce8f

  • SSDEEP

    1536:JrPEy2ZQbVcWzJ8Tapb2KlwfCI3GV2LE5zB8bwfwgGJ+pT:3i85bU7Yr

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.7.145:4444

Targets

    • Target

      30ca59fd19f2ea733110d47eaa28df03_JaffaCakes118

    • Size

      102KB

    • MD5

      30ca59fd19f2ea733110d47eaa28df03

    • SHA1

      d805e91b13b5b78fe32c4f52df6d181b592456ae

    • SHA256

      005010be1f9a0bd4cbaabce829c6fe1f13649dfcfd050458d171d6ee2714470a

    • SHA512

      37cd95d34e90c7a5ec97ce90e47d50aab99195681be9c5ad483b360addd09b894dc5ca4cc5c9fcc5073ba3f7a3e6f9485ba3879ee5df0e71a6d22d0822b1ce8f

    • SSDEEP

      1536:JrPEy2ZQbVcWzJ8Tapb2KlwfCI3GV2LE5zB8bwfwgGJ+pT:3i85bU7Yr

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Process spawned suspicious child process

      This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks