General

  • Target

    ca6591af2042770d90e33cf35ba6d52f_JaffaCakes118

  • Size

    21KB

  • Sample

    241206-b1dwtsyqel

  • MD5

    ca6591af2042770d90e33cf35ba6d52f

  • SHA1

    2e578ddb7667ba4daabf7fb4bcafedeccc505d27

  • SHA256

    ba7c8d9d62d3847c13dc2b1b48277d0318209dd35213cc894048210e60a60ee8

  • SHA512

    fe4cb04c4ccff99ec34916290fe1839c4276693a05a3025a3a3c5dd1f0bb10f77a023eb3616b0ec49d895f1beb72c288d4d61b244540f976feb6e86603a33fe9

  • SSDEEP

    384:m+oay9I+0FkY4t1cIAxbE9lY4a0kHhU2inN86IZucAXz:aay9IL4Ii14uF

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.1.11:4444

Targets

    • Target

      ca6591af2042770d90e33cf35ba6d52f_JaffaCakes118

    • Size

      21KB

    • MD5

      ca6591af2042770d90e33cf35ba6d52f

    • SHA1

      2e578ddb7667ba4daabf7fb4bcafedeccc505d27

    • SHA256

      ba7c8d9d62d3847c13dc2b1b48277d0318209dd35213cc894048210e60a60ee8

    • SHA512

      fe4cb04c4ccff99ec34916290fe1839c4276693a05a3025a3a3c5dd1f0bb10f77a023eb3616b0ec49d895f1beb72c288d4d61b244540f976feb6e86603a33fe9

    • SSDEEP

      384:m+oay9I+0FkY4t1cIAxbE9lY4a0kHhU2inN86IZucAXz:aay9IL4Ii14uF

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

MITRE ATT&CK Enterprise v15

Tasks