General

  • Target

    ad13ede6f1118f9684a04282b7b2b00f_JaffaCakes118

  • Size

    20KB

  • Sample

    241128-v3bn2azmhp

  • MD5

    ad13ede6f1118f9684a04282b7b2b00f

  • SHA1

    09a0bcd6c4f12ceb21c89fed152bc245ea393498

  • SHA256

    e7e6a96f6e9b645ed008057a1184195d42d99d38f99373d12aa6c545bdff0dad

  • SHA512

    906a7c20b70195d4051ccce82fd1ab85b06613240d3e71c38955569740b146c40739ddc8858e351b6eb1969d7dd58f9d1fdbda4386e7f394a3dfd1f9aa4b6654

  • SSDEEP

    384:K4GaGIGECv88a8GakOWlTxZgC9eourB5ThsySkPrl:KxaGIG/vZGaDWllfer5Fsyt

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.0.4:8080

Targets

    • Target

      ad13ede6f1118f9684a04282b7b2b00f_JaffaCakes118

    • Size

      20KB

    • MD5

      ad13ede6f1118f9684a04282b7b2b00f

    • SHA1

      09a0bcd6c4f12ceb21c89fed152bc245ea393498

    • SHA256

      e7e6a96f6e9b645ed008057a1184195d42d99d38f99373d12aa6c545bdff0dad

    • SHA512

      906a7c20b70195d4051ccce82fd1ab85b06613240d3e71c38955569740b146c40739ddc8858e351b6eb1969d7dd58f9d1fdbda4386e7f394a3dfd1f9aa4b6654

    • SSDEEP

      384:K4GaGIGECv88a8GakOWlTxZgC9eourB5ThsySkPrl:KxaGIG/vZGaDWllfer5Fsyt

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks