General

  • Target

    72074380bf8cd8ec7e5477c6d9b7b858_JaffaCakes118

  • Size

    75KB

  • Sample

    240726-blympazeld

  • MD5

    72074380bf8cd8ec7e5477c6d9b7b858

  • SHA1

    30d6371befd18fa32c428f31576a83d8c3c77f08

  • SHA256

    19a7cf59b12637f798a978c6b1a0a9c764434731be253671bc5cbc1d28eb34f8

  • SHA512

    309ca82a5eeafa68080baaa40dab7217b80cad931e3f33e4e161fcd039a8158984244e8ecc9d4a2d9989a75552026cce775d41406a5eb5c132ff7b36f0be57e4

  • SSDEEP

    1536:J5sc375Ab4EBanICQFuIiyd6gWHpkeaPRAER:Jp5wfCQF92HpkeWp

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      72074380bf8cd8ec7e5477c6d9b7b858_JaffaCakes118

    • Size

      75KB

    • MD5

      72074380bf8cd8ec7e5477c6d9b7b858

    • SHA1

      30d6371befd18fa32c428f31576a83d8c3c77f08

    • SHA256

      19a7cf59b12637f798a978c6b1a0a9c764434731be253671bc5cbc1d28eb34f8

    • SHA512

      309ca82a5eeafa68080baaa40dab7217b80cad931e3f33e4e161fcd039a8158984244e8ecc9d4a2d9989a75552026cce775d41406a5eb5c132ff7b36f0be57e4

    • SSDEEP

      1536:J5sc375Ab4EBanICQFuIiyd6gWHpkeaPRAER:Jp5wfCQF92HpkeWp

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Modifies firewall policy service

    • Modifies security service

    • Network Share Discovery

      Attempt to gather information on host network.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks