General

  • Target

    d29893f6a18a513e5023a6c0c70e76af_JaffaCakes118

  • Size

    7KB

  • Sample

    240907-xbsjksycql

  • MD5

    d29893f6a18a513e5023a6c0c70e76af

  • SHA1

    baaa69f563e687c3b33ebd93245581f0dedadde8

  • SHA256

    77d052a6529a4a2421b17aa558655e4b8d5f7c28d00b4b643d924f2e716c75a1

  • SHA512

    8eee8f8d5e95ecbd158ac579229b9b9bb62247b31a1d0add16471e053f1c9c4bbdc0ffdc36f68bfb397a42da134fcae7b4a370f5d82d5ae912260036065c2fd9

  • SSDEEP

    96:qWg9UgQ19mPXBJVP7wWRaSvQv/j2AMwRERDO8bX6uvBm0glmpEc7XvoYi:5gQ1yBJBwiaSQKRAYJTpzXvoY

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.1.10:7777

Targets

    • Target

      d29893f6a18a513e5023a6c0c70e76af_JaffaCakes118

    • Size

      7KB

    • MD5

      d29893f6a18a513e5023a6c0c70e76af

    • SHA1

      baaa69f563e687c3b33ebd93245581f0dedadde8

    • SHA256

      77d052a6529a4a2421b17aa558655e4b8d5f7c28d00b4b643d924f2e716c75a1

    • SHA512

      8eee8f8d5e95ecbd158ac579229b9b9bb62247b31a1d0add16471e053f1c9c4bbdc0ffdc36f68bfb397a42da134fcae7b4a370f5d82d5ae912260036065c2fd9

    • SSDEEP

      96:qWg9UgQ19mPXBJVP7wWRaSvQv/j2AMwRERDO8bX6uvBm0glmpEc7XvoYi:5gQ1yBJBwiaSQKRAYJTpzXvoY

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks