General

  • Target

    56d604f2e739f8daef926c6205b499f1_JaffaCakes118

  • Size

    2KB

  • Sample

    240518-z5alzagb2s

  • MD5

    56d604f2e739f8daef926c6205b499f1

  • SHA1

    175fb8f1d97a95f9fb3361fc1a6e7a22b8920556

  • SHA256

    4543a6366a7a6b8a5e393d505b50cbddcf4b5248a021750904fe92c87986cc47

  • SHA512

    c09cdc9ea7970e631a75d939232f168753527c730880e55874446c4f48452cc61f6de72480be7979cd4c95054448412209d126650fcd93f80c9ce0c2be352b0b

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.119.167:4444

Targets

    • Target

      56d604f2e739f8daef926c6205b499f1_JaffaCakes118

    • Size

      2KB

    • MD5

      56d604f2e739f8daef926c6205b499f1

    • SHA1

      175fb8f1d97a95f9fb3361fc1a6e7a22b8920556

    • SHA256

      4543a6366a7a6b8a5e393d505b50cbddcf4b5248a021750904fe92c87986cc47

    • SHA512

      c09cdc9ea7970e631a75d939232f168753527c730880e55874446c4f48452cc61f6de72480be7979cd4c95054448412209d126650fcd93f80c9ce0c2be352b0b

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Tasks