General

  • Target

    ad9665a970dd4d4a975f95cc172f3720_JaffaCakes118

  • Size

    72KB

  • Sample

    240820-c7jakazdmb

  • MD5

    ad9665a970dd4d4a975f95cc172f3720

  • SHA1

    98338bee94d2af7f1350664a9c9bda8d762252c3

  • SHA256

    b710581c8264f1905b2925ac64910c4c1ecd99778d9453133442cfc724bae6fc

  • SHA512

    750617c71318b921b51e790c9537a4eec6781065377e4d1bbc34a7cfe2d63c0dff8e334bbd1f2b28b83f5a5d599793b78875fc10f6ee558d3d1cb2f4f8ae311b

  • SSDEEP

    1536:IUkBWDe1it9326JxywvLXOslXLWLGqAMb+KR0Nc8QsJq39:XkHiTG00CyYXLWLoe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.0.102:4444

Targets

    • Target

      ad9665a970dd4d4a975f95cc172f3720_JaffaCakes118

    • Size

      72KB

    • MD5

      ad9665a970dd4d4a975f95cc172f3720

    • SHA1

      98338bee94d2af7f1350664a9c9bda8d762252c3

    • SHA256

      b710581c8264f1905b2925ac64910c4c1ecd99778d9453133442cfc724bae6fc

    • SHA512

      750617c71318b921b51e790c9537a4eec6781065377e4d1bbc34a7cfe2d63c0dff8e334bbd1f2b28b83f5a5d599793b78875fc10f6ee558d3d1cb2f4f8ae311b

    • SSDEEP

      1536:IUkBWDe1it9326JxywvLXOslXLWLGqAMb+KR0Nc8QsJq39:XkHiTG00CyYXLWLoe0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks