General

  • Target

    92e7f06b1114fb53e9fe7257585d3f84_JaffaCakes118

  • Size

    3KB

  • Sample

    240603-2zepvadb32

  • MD5

    92e7f06b1114fb53e9fe7257585d3f84

  • SHA1

    ae7e1699c607aa83574108f8274ff8488c4b2cec

  • SHA256

    9b23ac3682a2849fef0df636b8cdff76f09b6edd8241a2a87918a97f7705a928

  • SHA512

    e51460acc7c479b21ff789ede52c460fd93c5e18dff4f477590619608e99a29bc715f15bbaebe70aef1e9fa40ab00080a56015ca2eec184c0c5145daa884a033

Malware Config

Extracted

Family

metasploit

Version

metasploit_stager

C2

192.168.0.0:5555

Targets

    • Target

      92e7f06b1114fb53e9fe7257585d3f84_JaffaCakes118

    • Size

      3KB

    • MD5

      92e7f06b1114fb53e9fe7257585d3f84

    • SHA1

      ae7e1699c607aa83574108f8274ff8488c4b2cec

    • SHA256

      9b23ac3682a2849fef0df636b8cdff76f09b6edd8241a2a87918a97f7705a928

    • SHA512

      e51460acc7c479b21ff789ede52c460fd93c5e18dff4f477590619608e99a29bc715f15bbaebe70aef1e9fa40ab00080a56015ca2eec184c0c5145daa884a033

    Score
    1/10
    • Target

      template.pdf

    • Size

      7KB

    • MD5

      a426f7edacfa5d33cc41a921097b78de

    • SHA1

      a53ee2954dc838b0d50b0f4e48afb4613f33c003

    • SHA256

      ffe7aea508b716df3f57db414c949d33ba5e75a55cb966a6ff70cef7e4741495

    • SHA512

      82b6e8cdf6d9bbcd1cb9f820be0aebe4c880259510d787c2dd9976effc328fb4537069de147dc3ef929a84f08526605baabf1f71df6d9627dcf89028d67d1b8f

    • SSDEEP

      24:eFGStrJ9u0/6+WnZd0BQAVDaYNq9KZqC/eNDMSCvOfpmB:is0ru0BQats9E/SD9C2sB

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks