General

  • Target

    f5e8a0caef29a4a3e140edaf2eb6e774_JaffaCakes118

  • Size

    85KB

  • Sample

    241215-1tvnfaymfx

  • MD5

    f5e8a0caef29a4a3e140edaf2eb6e774

  • SHA1

    40c5e804203ba3e34b3bdf7a266698cb9e0e807b

  • SHA256

    02415d625e85d096e07cfab26d4c414054a74a9eab362519618b9875cde3444c

  • SHA512

    4e1d3d0a422d2d1adcd73f92c76f94c1b29c1bcaf8e31dd9618b30ed3f5edebfd5f06c3278170dd14d95862162bfa01c0d633a6db29522d4a823392c1f5155b5

  • SSDEEP

    768:zb95GCvLUfaR6cL2jbqTb/qNATN7j6FxKJe6R4ZU9qZU9y:zb95lLX3jTbySTux+R4pl

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.142.128:31337

Targets

    • Target

      f5e8a0caef29a4a3e140edaf2eb6e774_JaffaCakes118

    • Size

      85KB

    • MD5

      f5e8a0caef29a4a3e140edaf2eb6e774

    • SHA1

      40c5e804203ba3e34b3bdf7a266698cb9e0e807b

    • SHA256

      02415d625e85d096e07cfab26d4c414054a74a9eab362519618b9875cde3444c

    • SHA512

      4e1d3d0a422d2d1adcd73f92c76f94c1b29c1bcaf8e31dd9618b30ed3f5edebfd5f06c3278170dd14d95862162bfa01c0d633a6db29522d4a823392c1f5155b5

    • SSDEEP

      768:zb95GCvLUfaR6cL2jbqTb/qNATN7j6FxKJe6R4ZU9qZU9y:zb95lLX3jTbySTux+R4pl

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

MITRE ATT&CK Enterprise v15

Tasks