General

  • Target

    d0411053519094bd3fcf50bf1732b495_JaffaCakes118

  • Size

    47KB

  • Sample

    240906-xpff6stbma

  • MD5

    d0411053519094bd3fcf50bf1732b495

  • SHA1

    58b55fa9c19b7f9361297ed0659e78f01336929a

  • SHA256

    666562eba35fda72fea7026c9a142c05d6f9ef7cb0f15902a8e3bf5974fe90a9

  • SHA512

    d115b2aa419889f4c507b2bd37f73d65c33f6ceedbeb0c458b2b9611ccfdd8d85556e4b31521bed2c287f57d6f9ee361c7f1431d59154e2d5067d1598d3e1fa2

  • SSDEEP

    768:v5scsxI71Hv2mTEb4YXVzancAloPCx+k2uIuHtod6gWtxVjkeaPnAJWAEnRmtls:v5sc375Ab4EBanICQFuIiyd6gWHpkeaV

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      d0411053519094bd3fcf50bf1732b495_JaffaCakes118

    • Size

      47KB

    • MD5

      d0411053519094bd3fcf50bf1732b495

    • SHA1

      58b55fa9c19b7f9361297ed0659e78f01336929a

    • SHA256

      666562eba35fda72fea7026c9a142c05d6f9ef7cb0f15902a8e3bf5974fe90a9

    • SHA512

      d115b2aa419889f4c507b2bd37f73d65c33f6ceedbeb0c458b2b9611ccfdd8d85556e4b31521bed2c287f57d6f9ee361c7f1431d59154e2d5067d1598d3e1fa2

    • SSDEEP

      768:v5scsxI71Hv2mTEb4YXVzancAloPCx+k2uIuHtod6gWtxVjkeaPnAJWAEnRmtls:v5sc375Ab4EBanICQFuIiyd6gWHpkeaV

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Modifies firewall policy service

    • Modifies security service

    • Network Share Discovery

      Attempt to gather information on host network.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks