General

  • Target

    e207bf94798bed7544c6f7648f16196f_JaffaCakes118

  • Size

    205KB

  • Sample

    240915-jvxqrateqm

  • MD5

    e207bf94798bed7544c6f7648f16196f

  • SHA1

    9775f2d7692f8b30d57451f55acf6b7a418dd397

  • SHA256

    42232705091057013ecad9f98e60e6245b7cc0b1ec85301e151ea021b38614b1

  • SHA512

    391023adec77d52e4236687d820894005384e5bff94dcf292dee96d4b377501f2e501a34737a0f3a914e18e2b9c5c0352c17174c830dd6b2a1a796cb6e3eeb37

  • SSDEEP

    6144:2eArpoa16GdUY8QOVbzebw0AohnvrYexxPAcvl/sw:2BrpoasG2xQOVbze1A6xY

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.2.215:443

Targets

    • Target

      e207bf94798bed7544c6f7648f16196f_JaffaCakes118

    • Size

      205KB

    • MD5

      e207bf94798bed7544c6f7648f16196f

    • SHA1

      9775f2d7692f8b30d57451f55acf6b7a418dd397

    • SHA256

      42232705091057013ecad9f98e60e6245b7cc0b1ec85301e151ea021b38614b1

    • SHA512

      391023adec77d52e4236687d820894005384e5bff94dcf292dee96d4b377501f2e501a34737a0f3a914e18e2b9c5c0352c17174c830dd6b2a1a796cb6e3eeb37

    • SSDEEP

      6144:2eArpoa16GdUY8QOVbzebw0AohnvrYexxPAcvl/sw:2BrpoasG2xQOVbze1A6xY

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks