General

  • Target

    fb203d24beb6e6501aa7e3433e9ca60e_JaffaCakes118

  • Size

    1.3MB

  • Sample

    240419-zf8gpsfg6v

  • MD5

    fb203d24beb6e6501aa7e3433e9ca60e

  • SHA1

    96c7caeda68cc87e74e668408112d0a85b49a5eb

  • SHA256

    032201b193518134e290da8a9e8583f19a08b6ad8f51a3e8ff709a10dd8eb359

  • SHA512

    6d131dafe0099df2cb4902e745a77ca7e882b0de89ec97d0ef1efdca9b822ff09f2cbd40fddca79c157343eff98a36631a66dc3cec90163ea6426ba92e268b0c

  • SSDEEP

    24576:t2+gMsqI5kLRBnQf7JI2QKUOQrNiu14R/BNOXGznJ/QYD:t1gPqRtQf7m/KUtrzIvZ

Malware Config

Extracted

Family

metasploit

Version

encoder/fnstenv_mov

Targets

    • Target

      fb203d24beb6e6501aa7e3433e9ca60e_JaffaCakes118

    • Size

      1.3MB

    • MD5

      fb203d24beb6e6501aa7e3433e9ca60e

    • SHA1

      96c7caeda68cc87e74e668408112d0a85b49a5eb

    • SHA256

      032201b193518134e290da8a9e8583f19a08b6ad8f51a3e8ff709a10dd8eb359

    • SHA512

      6d131dafe0099df2cb4902e745a77ca7e882b0de89ec97d0ef1efdca9b822ff09f2cbd40fddca79c157343eff98a36631a66dc3cec90163ea6426ba92e268b0c

    • SSDEEP

      24576:t2+gMsqI5kLRBnQf7JI2QKUOQrNiu14R/BNOXGznJ/QYD:t1gPqRtQf7m/KUtrzIvZ

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Drops file in System32 directory

MITRE ATT&CK Matrix

Tasks