General

  • Target

    f4eee5f982f2482fbb3f8761404805f1_JaffaCakes118

  • Size

    8KB

  • Sample

    240925-chhbzaycmk

  • MD5

    f4eee5f982f2482fbb3f8761404805f1

  • SHA1

    7d8241337adba17d4b0577aa0843112c769bf942

  • SHA256

    3fc24b8be6c1aeafd1d4be0aa1d26fe5d51bdb6308f5157b894a13c255d31e0e

  • SHA512

    b69dda8ac7130dea6dbeb3c902af003de27f416c1424cddc52125367b216d03153ea53ce643a428d6f97980f9421887a936cddcae0f10bb47d05971b0eaf8ea8

  • SSDEEP

    48:i7uD6XmotviCNIA734mkhthkYkJggydFpgH2SD9CTolgJehMSO:4WIgA73xJgXd3gHZ5Golg

Malware Config

Extracted

Family

metasploit

Version

metasploit_stager

C2

149.248.6.193:2011

Targets

    • Target

      f4eee5f982f2482fbb3f8761404805f1_JaffaCakes118

    • Size

      8KB

    • MD5

      f4eee5f982f2482fbb3f8761404805f1

    • SHA1

      7d8241337adba17d4b0577aa0843112c769bf942

    • SHA256

      3fc24b8be6c1aeafd1d4be0aa1d26fe5d51bdb6308f5157b894a13c255d31e0e

    • SHA512

      b69dda8ac7130dea6dbeb3c902af003de27f416c1424cddc52125367b216d03153ea53ce643a428d6f97980f9421887a936cddcae0f10bb47d05971b0eaf8ea8

    • SSDEEP

      48:i7uD6XmotviCNIA734mkhthkYkJggydFpgH2SD9CTolgJehMSO:4WIgA73xJgXd3gHZ5Golg

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Blocklisted process makes network request

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks