General

  • Target

    e4a4438149a8d28f54bb56ef2847626e_JaffaCakes118

  • Size

    11KB

  • Sample

    240916-m8w8xstgne

  • MD5

    e4a4438149a8d28f54bb56ef2847626e

  • SHA1

    73b7268c7bf5ecf229c3d49e7f4a78d1fc6b9278

  • SHA256

    2960372244030ce3cae0e1ea21965c5facb5c679e564555b595a728e0c02bdc6

  • SHA512

    fb0ecc2d2334b72c0cd958efda74f9d515bb99c277bb1641bbdc46c4a6ad4897eae0be8094f9961f9c8d34363c81a47b7ae940ddf61bdac72215d9a07f53bf99

  • SSDEEP

    12:VtGSGK4d//UHwGlIFWVd2UROmDvLCorIWG8aF90exkJem7WY2GulBM5B:VtGStCOlhF9DvLVIWGLP0LSbG1B

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_nonx_tcp

C2

172.25.0.14:4444

Targets

    • Target

      e4a4438149a8d28f54bb56ef2847626e_JaffaCakes118

    • Size

      11KB

    • MD5

      e4a4438149a8d28f54bb56ef2847626e

    • SHA1

      73b7268c7bf5ecf229c3d49e7f4a78d1fc6b9278

    • SHA256

      2960372244030ce3cae0e1ea21965c5facb5c679e564555b595a728e0c02bdc6

    • SHA512

      fb0ecc2d2334b72c0cd958efda74f9d515bb99c277bb1641bbdc46c4a6ad4897eae0be8094f9961f9c8d34363c81a47b7ae940ddf61bdac72215d9a07f53bf99

    • SSDEEP

      12:VtGSGK4d//UHwGlIFWVd2UROmDvLCorIWG8aF90exkJem7WY2GulBM5B:VtGStCOlhF9DvLVIWGLP0LSbG1B

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks