General

  • Target

    d408b1c4f2c8606a303f3f3ca8ae4c5b_JaffaCakes118

  • Size

    72KB

  • Sample

    240908-lddyeszfrg

  • MD5

    d408b1c4f2c8606a303f3f3ca8ae4c5b

  • SHA1

    5053b04d77642307e9606ba4f8d2bcc5959960f1

  • SHA256

    b0e5de3b3e58d8a759306d0a5e1bcea5519419e27a9f18ff29cfad69ad5f55cc

  • SHA512

    0e5871c9d71ec32ca5c72ecb3f6cb8864dbd7a3940be38c925d893e7e0ce965fd32dc197d30f8011b623fe13f3e2dbd13b7d714a6b09238e6793a4da7fe08f41

  • SSDEEP

    1536:I02duLfm46PBY85fjRupKo42cccYaMb+KR0Nc8QsJq39:N2uL+ZY0fjRM48ae0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.0.148:4455

Targets

    • Target

      d408b1c4f2c8606a303f3f3ca8ae4c5b_JaffaCakes118

    • Size

      72KB

    • MD5

      d408b1c4f2c8606a303f3f3ca8ae4c5b

    • SHA1

      5053b04d77642307e9606ba4f8d2bcc5959960f1

    • SHA256

      b0e5de3b3e58d8a759306d0a5e1bcea5519419e27a9f18ff29cfad69ad5f55cc

    • SHA512

      0e5871c9d71ec32ca5c72ecb3f6cb8864dbd7a3940be38c925d893e7e0ce965fd32dc197d30f8011b623fe13f3e2dbd13b7d714a6b09238e6793a4da7fe08f41

    • SSDEEP

      1536:I02duLfm46PBY85fjRupKo42cccYaMb+KR0Nc8QsJq39:N2uL+ZY0fjRM48ae0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks