General

  • Target

    JaffaCakes118_8e0a6787d446d2043bf1b04f829ae3b7d22df8c2f885b865674dc49859244502

  • Size

    211KB

  • Sample

    241228-3evq1avqdj

  • MD5

    bb4ebd709a8963d7e0e40961536c9c61

  • SHA1

    03be65d1cb2a97e4fe9b0ae1d8931b14d5366387

  • SHA256

    8e0a6787d446d2043bf1b04f829ae3b7d22df8c2f885b865674dc49859244502

  • SHA512

    39a9679ff1977e3599db5166456bbfb87eb47104d7aefcb2264e947e866da0b1e55796f26b4653a7402fc5871e51366242180274e8cd9cfc5114e94d96414676

  • SSDEEP

    6144:6Lv8+EMlvnd4J0QCck7nou04pr8sid6/A:3+EM9d4/Cc8ou4sidD

Malware Config

Extracted

Family

metasploit

Version

windows/download_exec

C2

http://georgiaonsale.com:443/task.html /start.html /smm.html /cal.html?usersid=hw#########-##

Targets

    • Target

      2e417482a83d63f83f19dff658e7eec05ffb89c4d7b9e417eb8ec2951c4973fd

    • Size

      383KB

    • MD5

      58d62f826da094b6ab7da7e0c1e05a23

    • SHA1

      ca53b321d55c1ddbe0194f71e07ba26c1a8ec40d

    • SHA256

      2e417482a83d63f83f19dff658e7eec05ffb89c4d7b9e417eb8ec2951c4973fd

    • SHA512

      136d97ad71550fc17335dfbcc92ab181f4446afab5b94891d334e0f034465b47010c8cadd986b73615c3fe65485d46b3d913c945a683a6e4cb7aa763437f81b5

    • SSDEEP

      6144:VedlOgSNOqgVndy73viT5jSoLY4c8Hs/x68uSUtiL9xoqd2nrC9rhkIPuyxs3B8j:VedUjOqqy+TLY4sc8uSUkL9x1d1kIPu0

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

MITRE ATT&CK Enterprise v15

Tasks