General

  • Target

    dd47cdc584c1934835e2f8d3ebd55c49_JaffaCakes118

  • Size

    626KB

  • Sample

    240912-316ematbmc

  • MD5

    dd47cdc584c1934835e2f8d3ebd55c49

  • SHA1

    43fc40273dd033b2e391e6eda38f49437d477887

  • SHA256

    4eb8f41983ee7f2d4c4fbc0c522015d83af600665f7202d20bab6b2fb00c88bc

  • SHA512

    f776bccc9cf0dfe83caeb509835ed5884d137148bccad1d5454df6f9b90e4e6b0488c3b79432c1ff4ca333d1f4dc773d63f1813b61ea16211a3789cf0b2fc05c

  • SSDEEP

    12288:KBitsaJiKq+IvmAU8e5i88xsTmOg+LuxMTWNm868Oa2hcEiP/3IWVJ/ux9cb0G:KntKq+JF8Ei88yTmr+LuxMW6E/7

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.1.253:65535

Targets

    • Target

      dd47cdc584c1934835e2f8d3ebd55c49_JaffaCakes118

    • Size

      626KB

    • MD5

      dd47cdc584c1934835e2f8d3ebd55c49

    • SHA1

      43fc40273dd033b2e391e6eda38f49437d477887

    • SHA256

      4eb8f41983ee7f2d4c4fbc0c522015d83af600665f7202d20bab6b2fb00c88bc

    • SHA512

      f776bccc9cf0dfe83caeb509835ed5884d137148bccad1d5454df6f9b90e4e6b0488c3b79432c1ff4ca333d1f4dc773d63f1813b61ea16211a3789cf0b2fc05c

    • SSDEEP

      12288:KBitsaJiKq+IvmAU8e5i88xsTmOg+LuxMTWNm868Oa2hcEiP/3IWVJ/ux9cb0G:KntKq+JF8Ei88yTmr+LuxMW6E/7

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks