General

  • Target

    1b2d0d4bbc79a513571179f889940a6f_JaffaCakes118

  • Size

    72KB

  • Sample

    240701-nycxzazdjg

  • MD5

    1b2d0d4bbc79a513571179f889940a6f

  • SHA1

    49a4d97154aee63b313945ea0aadaa3290d9f136

  • SHA256

    912eaee1f09f56c8b0cf22e9054625c9a28a3eb93188177e8ab37a8b72dfd99e

  • SHA512

    921a6b003780d2a0b5e5cc9bd18c0316ee60a9b81090199b0ab36d99cb1522ff422f084933e49e5ce6b9bd4f40a897b59a945d21c2db1d2384d5ceecc0fb0dfb

  • SSDEEP

    1536:ITXOVg/7Xgo8MOJwBFxwYzDkRvtNSTMb+KR0Nc8QsJq39:MXOVgcrwxBPkPge0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.0.101:7418

Targets

    • Target

      1b2d0d4bbc79a513571179f889940a6f_JaffaCakes118

    • Size

      72KB

    • MD5

      1b2d0d4bbc79a513571179f889940a6f

    • SHA1

      49a4d97154aee63b313945ea0aadaa3290d9f136

    • SHA256

      912eaee1f09f56c8b0cf22e9054625c9a28a3eb93188177e8ab37a8b72dfd99e

    • SHA512

      921a6b003780d2a0b5e5cc9bd18c0316ee60a9b81090199b0ab36d99cb1522ff422f084933e49e5ce6b9bd4f40a897b59a945d21c2db1d2384d5ceecc0fb0dfb

    • SSDEEP

      1536:ITXOVg/7Xgo8MOJwBFxwYzDkRvtNSTMb+KR0Nc8QsJq39:MXOVgcrwxBPkPge0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks