General

  • Target

    b9c5cccf05c91ed4f16aa455ba3b6c15_JaffaCakes118

  • Size

    246KB

  • Sample

    240823-bjc8zazdrl

  • MD5

    b9c5cccf05c91ed4f16aa455ba3b6c15

  • SHA1

    d160411467f774c10b1b0a59c2bfe7ad19027832

  • SHA256

    8d64de7fdbfd14b6bd4d24ff07ce6d4f91fe712172c5508b24fa2f740918ac6f

  • SHA512

    ec66b8b1d956efffd4e20c7a33ab0a929daab151506a7db0b617440ccce882a9dc47d52c4be61992063289295e49f5b6ecf450dc18b2e8960c6ff9d6d0a8d933

  • SSDEEP

    6144:k3GbsdGhWwplZGwL7Ioe27ezVEd5HphJVSkizwD:sGcGhFpfUt2qpohHSO

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.0.2.112:1234

Targets

    • Target

      b9c5cccf05c91ed4f16aa455ba3b6c15_JaffaCakes118

    • Size

      246KB

    • MD5

      b9c5cccf05c91ed4f16aa455ba3b6c15

    • SHA1

      d160411467f774c10b1b0a59c2bfe7ad19027832

    • SHA256

      8d64de7fdbfd14b6bd4d24ff07ce6d4f91fe712172c5508b24fa2f740918ac6f

    • SHA512

      ec66b8b1d956efffd4e20c7a33ab0a929daab151506a7db0b617440ccce882a9dc47d52c4be61992063289295e49f5b6ecf450dc18b2e8960c6ff9d6d0a8d933

    • SSDEEP

      6144:k3GbsdGhWwplZGwL7Ioe27ezVEd5HphJVSkizwD:sGcGhFpfUt2qpohHSO

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks