General

  • Target

    2a084bc25c7a6141a0b24c18f7c6d2a1_JaffaCakes118

  • Size

    72KB

  • Sample

    240707-2msqyazdrr

  • MD5

    2a084bc25c7a6141a0b24c18f7c6d2a1

  • SHA1

    27101c9df8a3b45ba5c4fcb1778535cb49bd07ec

  • SHA256

    5916da5f8b232760f1b61b3656a3180428ddee49f29128a6f3445262ecdbaf15

  • SHA512

    24536e51b53353a3a0c63242fdc286b3259261d275d9d05286b073e278942560d75e14c2dd7e60da9ffa5d049ee35ce5a859d079bd654cd224943639b47cfd11

  • SSDEEP

    1536:Irf94FMKzBqgbtbQB69woNzGs20tFuH2z9tXfqXMb+KR0Nc8QsJq39:u94FMCtZVRGhYMA9pfEe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.1.167:443

Targets

    • Target

      2a084bc25c7a6141a0b24c18f7c6d2a1_JaffaCakes118

    • Size

      72KB

    • MD5

      2a084bc25c7a6141a0b24c18f7c6d2a1

    • SHA1

      27101c9df8a3b45ba5c4fcb1778535cb49bd07ec

    • SHA256

      5916da5f8b232760f1b61b3656a3180428ddee49f29128a6f3445262ecdbaf15

    • SHA512

      24536e51b53353a3a0c63242fdc286b3259261d275d9d05286b073e278942560d75e14c2dd7e60da9ffa5d049ee35ce5a859d079bd654cd224943639b47cfd11

    • SSDEEP

      1536:Irf94FMKzBqgbtbQB69woNzGs20tFuH2z9tXfqXMb+KR0Nc8QsJq39:u94FMCtZVRGhYMA9pfEe0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks