General

  • Target

    16814c016ac4f178d657406e2eb985fe_JaffaCakes118

  • Size

    155KB

  • Sample

    240627-ssa9eazdjl

  • MD5

    16814c016ac4f178d657406e2eb985fe

  • SHA1

    d012ef1933d3f88b319bd51ff3cea3c5b50e04c5

  • SHA256

    f0787348022d9a4123d12efe948df55475a606abd1bbc7c492f0541d9f59aec8

  • SHA512

    7f9cb8f47089c0aabc00c5b7b78146d0152867255d2c35400603fec01ef15da4f57e97be4cb29c327090894ebbebd236ec586e1de98745e58cd02cc8a7dd8780

  • SSDEEP

    768:puCkdC2D5z4oWV0OCAB4Rld8Inv4AR/8xdLRHmy1aRKC19d0U:pjkdjl8WK4RP84vjlOPTC1z0U

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      16814c016ac4f178d657406e2eb985fe_JaffaCakes118

    • Size

      155KB

    • MD5

      16814c016ac4f178d657406e2eb985fe

    • SHA1

      d012ef1933d3f88b319bd51ff3cea3c5b50e04c5

    • SHA256

      f0787348022d9a4123d12efe948df55475a606abd1bbc7c492f0541d9f59aec8

    • SHA512

      7f9cb8f47089c0aabc00c5b7b78146d0152867255d2c35400603fec01ef15da4f57e97be4cb29c327090894ebbebd236ec586e1de98745e58cd02cc8a7dd8780

    • SSDEEP

      768:puCkdC2D5z4oWV0OCAB4Rld8Inv4AR/8xdLRHmy1aRKC19d0U:pjkdjl8WK4RP84vjlOPTC1z0U

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Matrix

Tasks