General

  • Target

    1dfa0f2269318026d980eea64092fa0e_JaffaCakes118

  • Size

    46KB

  • Sample

    240702-exjvfsvgna

  • MD5

    1dfa0f2269318026d980eea64092fa0e

  • SHA1

    ba69e919ece01489f9f7e8ef78840ffcb1b82b2c

  • SHA256

    b77403398535de58159e4d5ba2ae37a306282128698bbd364f7902db4dae43db

  • SHA512

    cee5141fce5bd2235d50397253311d3ba7b7e10000cce5dcf0177c6816483dbc94f1fc911068ec13efa41d98e89d819699fbd83fe5b57a211afafcf6dbcf5751

  • SSDEEP

    768:IuccVmaaPy9CyuJqpaRt9iZ1sq+K7Hhk1WQt34B55Hq3:IAV4HaZ17+8Etonpq3

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.56.1:31337

Targets

    • Target

      1dfa0f2269318026d980eea64092fa0e_JaffaCakes118

    • Size

      46KB

    • MD5

      1dfa0f2269318026d980eea64092fa0e

    • SHA1

      ba69e919ece01489f9f7e8ef78840ffcb1b82b2c

    • SHA256

      b77403398535de58159e4d5ba2ae37a306282128698bbd364f7902db4dae43db

    • SHA512

      cee5141fce5bd2235d50397253311d3ba7b7e10000cce5dcf0177c6816483dbc94f1fc911068ec13efa41d98e89d819699fbd83fe5b57a211afafcf6dbcf5751

    • SSDEEP

      768:IuccVmaaPy9CyuJqpaRt9iZ1sq+K7Hhk1WQt34B55Hq3:IAV4HaZ17+8Etonpq3

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks