General

  • Target

    d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118

  • Size

    174KB

  • Sample

    240907-re3aaszcqc

  • MD5

    d21c621d44bca8273b62c12c3bbd8d18

  • SHA1

    51e6f9f5ec103f11c5ddac5f673a0bf035d7d629

  • SHA256

    068b938f3445581d35ced514a15bbdc9352abd7538285b3c026a2b3a32020351

  • SHA512

    126db2189732449073f5c6905b89d3761233fb102d9b03e0a0b676fa39386213d72610ef5154e7bad5b06d3d9f141c934b4819b59d275c192856247f23743577

  • SSDEEP

    3072:q6UHMux55s+W0z9fb6ULsFvGTwHiygGKFvRaS0MwlnYkArorWd40Nno:BuWf0z9fHLyowHw5vRaEi7brWigo

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118

    • Size

      174KB

    • MD5

      d21c621d44bca8273b62c12c3bbd8d18

    • SHA1

      51e6f9f5ec103f11c5ddac5f673a0bf035d7d629

    • SHA256

      068b938f3445581d35ced514a15bbdc9352abd7538285b3c026a2b3a32020351

    • SHA512

      126db2189732449073f5c6905b89d3761233fb102d9b03e0a0b676fa39386213d72610ef5154e7bad5b06d3d9f141c934b4819b59d275c192856247f23743577

    • SSDEEP

      3072:q6UHMux55s+W0z9fb6ULsFvGTwHiygGKFvRaS0MwlnYkArorWd40Nno:BuWf0z9fHLyowHw5vRaEi7brWigo

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks