General

  • Target

    59f770974597fa27ef9e484feaca9cda_JaffaCakes118

  • Size

    132KB

  • Sample

    240331-wezavsgb3y

  • MD5

    59f770974597fa27ef9e484feaca9cda

  • SHA1

    c402332adb19c3973a64214dc313feccd1c8671d

  • SHA256

    60463c10a65048a11e37eb784b1b5f9dd9197d7bffe8cde8daa50cb56ef4d39e

  • SHA512

    7f31239c49dab452ff288a284bb14e5b7158239a3344599ead533b8282c7408d976fd8fadb6729840859d514c955468e1134b92bdf09ba001d65297ae01341c4

  • SSDEEP

    3072:42sMWkzbJh1qZ9QW69hd1MMdxPe9N9uA0hu9TBfcXcOuBXJ:hbJhs7QW69hd1MMdxPe9N9uA0hu9TBZR

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

18.189.106.45:13167

Targets

    • Target

      59f770974597fa27ef9e484feaca9cda_JaffaCakes118

    • Size

      132KB

    • MD5

      59f770974597fa27ef9e484feaca9cda

    • SHA1

      c402332adb19c3973a64214dc313feccd1c8671d

    • SHA256

      60463c10a65048a11e37eb784b1b5f9dd9197d7bffe8cde8daa50cb56ef4d39e

    • SHA512

      7f31239c49dab452ff288a284bb14e5b7158239a3344599ead533b8282c7408d976fd8fadb6729840859d514c955468e1134b92bdf09ba001d65297ae01341c4

    • SSDEEP

      3072:42sMWkzbJh1qZ9QW69hd1MMdxPe9N9uA0hu9TBfcXcOuBXJ:hbJhs7QW69hd1MMdxPe9N9uA0hu9TBZR

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks