General

  • Target

    c85823565a65acc4119498df54d78faa_JaffaCakes118

  • Size

    480KB

  • Sample

    240829-gw9qlaxclc

  • MD5

    c85823565a65acc4119498df54d78faa

  • SHA1

    2d08f9bd100e66e5910fc476dfb2ae2cb0d0e528

  • SHA256

    3c852529b4bf48a8eafa3149916189a33fb7fd4313d138342705fa2bfea108ed

  • SHA512

    04d48b59781807e787d7bc1c6b342454954e9a9a86dce610d008ecc067880922b4ce24c65a88e477948616482789931365680117da9f6886ad8f725c526d2c95

  • SSDEEP

    6144:VNi0C7+KQ8ISTJ4/FmdYBxT9FzbHc31pLYm4Kf0Y35iZZSHCX61Hs0yqFf42vMJH:biz/IMaNBxa/9iCnCJqxLvf2KnLdU

Malware Config

Extracted

Family

metasploit

Version

encoder/fnstenv_mov

Targets

    • Target

      c85823565a65acc4119498df54d78faa_JaffaCakes118

    • Size

      480KB

    • MD5

      c85823565a65acc4119498df54d78faa

    • SHA1

      2d08f9bd100e66e5910fc476dfb2ae2cb0d0e528

    • SHA256

      3c852529b4bf48a8eafa3149916189a33fb7fd4313d138342705fa2bfea108ed

    • SHA512

      04d48b59781807e787d7bc1c6b342454954e9a9a86dce610d008ecc067880922b4ce24c65a88e477948616482789931365680117da9f6886ad8f725c526d2c95

    • SSDEEP

      6144:VNi0C7+KQ8ISTJ4/FmdYBxT9FzbHc31pLYm4Kf0Y35iZZSHCX61Hs0yqFf42vMJH:biz/IMaNBxa/9iCnCJqxLvf2KnLdU

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Deletes itself

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks