General

  • Target

    JaffaCakes118_6ad0d19de0d8409567399389c8432110

  • Size

    1024B

  • Sample

    250103-hc1h9aspcx

  • MD5

    6ad0d19de0d8409567399389c8432110

  • SHA1

    cffeb3a296d82561065b24b97b519dce6ac55e7f

  • SHA256

    952ceeb42dea1a9037570320ea32ac9500bc19324a0373744f35b8002b03daae

  • SHA512

    7751cb5b3a2adead439c26148f2f69000fd95b81e797c9fb45af6cdd6a38e91b3d3ed2cbde9dfd5a6776cc638e0ee5fd2acca317343cd74ce386c628802a3341

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.14.103:443

Targets

    • Target

      JaffaCakes118_6ad0d19de0d8409567399389c8432110

    • Size

      1024B

    • MD5

      6ad0d19de0d8409567399389c8432110

    • SHA1

      cffeb3a296d82561065b24b97b519dce6ac55e7f

    • SHA256

      952ceeb42dea1a9037570320ea32ac9500bc19324a0373744f35b8002b03daae

    • SHA512

      7751cb5b3a2adead439c26148f2f69000fd95b81e797c9fb45af6cdd6a38e91b3d3ed2cbde9dfd5a6776cc638e0ee5fd2acca317343cd74ce386c628802a3341

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

MITRE ATT&CK Enterprise v15

Tasks