General

  • Target

    bbf0c8b10e3f739f2bd1cc3abbe6b073_JaffaCakes118

  • Size

    106KB

  • Sample

    240823-qtwwdszajq

  • MD5

    bbf0c8b10e3f739f2bd1cc3abbe6b073

  • SHA1

    19cb15692e8a674421821f58f6bed4160744ed73

  • SHA256

    339daf7546bbaae7cf03222ab127d726bca8f2435ed4465a7f381b0ec417c82e

  • SHA512

    d11e088d2a0e46fb75a78ffb1e8639ad4eb97234f253ad0b6c96eb302e396b554111aeb720e434d19ee0d2dc10768fca7a26c48d6b1e834b26594675fd691e1e

  • SSDEEP

    3072:P5a0pGtk+Rd2p2CXiOzgl2IwLFMnoggfRuv3:xa0EtoiKgl2IwLKndgJuv3

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      bbf0c8b10e3f739f2bd1cc3abbe6b073_JaffaCakes118

    • Size

      106KB

    • MD5

      bbf0c8b10e3f739f2bd1cc3abbe6b073

    • SHA1

      19cb15692e8a674421821f58f6bed4160744ed73

    • SHA256

      339daf7546bbaae7cf03222ab127d726bca8f2435ed4465a7f381b0ec417c82e

    • SHA512

      d11e088d2a0e46fb75a78ffb1e8639ad4eb97234f253ad0b6c96eb302e396b554111aeb720e434d19ee0d2dc10768fca7a26c48d6b1e834b26594675fd691e1e

    • SSDEEP

      3072:P5a0pGtk+Rd2p2CXiOzgl2IwLFMnoggfRuv3:xa0EtoiKgl2IwLKndgJuv3

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks