General

  • Target

    16d73ca6f773f41090bbe6c19abe162d_JaffaCakes118

  • Size

    164KB

  • Sample

    240627-vvvrya1fph

  • MD5

    16d73ca6f773f41090bbe6c19abe162d

  • SHA1

    c90cde785490e124fe9c4f063f93c03a232a3d3c

  • SHA256

    b2fe1c73147c73bed1285f439d69410803b5e845d4dff7b26b77ebf9f1ca7bcc

  • SHA512

    af569f927b70a35cd2c359ec5d50150ba4f93f019b4e51eb0904e4de4626d3050f15751e42394be871a1d7653956078a98c036885b4e03db9375a3f89fd675a9

  • SSDEEP

    1536:lLnPykk5ToH44Zg354IrCs2C7Oxy5romOlAh9YZLnPe0LwP3wWAKRyzv:NnPyn5cs54IrccS4ob09YZnPfMPXR0v

Malware Config

Extracted

Family

metasploit

Version

encoder/fnstenv_mov

Targets

    • Target

      16d73ca6f773f41090bbe6c19abe162d_JaffaCakes118

    • Size

      164KB

    • MD5

      16d73ca6f773f41090bbe6c19abe162d

    • SHA1

      c90cde785490e124fe9c4f063f93c03a232a3d3c

    • SHA256

      b2fe1c73147c73bed1285f439d69410803b5e845d4dff7b26b77ebf9f1ca7bcc

    • SHA512

      af569f927b70a35cd2c359ec5d50150ba4f93f019b4e51eb0904e4de4626d3050f15751e42394be871a1d7653956078a98c036885b4e03db9375a3f89fd675a9

    • SSDEEP

      1536:lLnPykk5ToH44Zg354IrCs2C7Oxy5romOlAh9YZLnPe0LwP3wWAKRyzv:NnPyn5cs54IrccS4ob09YZnPfMPXR0v

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks