General

  • Target

    d3614c5a6d1bba2122f02b72679c1858_JaffaCakes118

  • Size

    159KB

  • Sample

    240908-dhcxxs1gpl

  • MD5

    d3614c5a6d1bba2122f02b72679c1858

  • SHA1

    c79876ea2532814732d0beeb07410d81f1aea37d

  • SHA256

    b6e20820df5f564e5139f7610bb192b9c05e5db0a2b8c336688f746127d54f1d

  • SHA512

    8acd7c809b9fe497e9ca202d6e90d9ba1c39d3beb602e5bde0e1100a4113ce413228708777202a84430e4fa60e4563a472d4e590f8a16ee48ec153218ca3a526

  • SSDEEP

    3072:g7gN+wsZgLOD6j5gZFqfgXTx7ZtnKbuPmZJQC528pSqG4/GqD:g7gN+/Z76jyzQYRZJQffQC57e4t

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      Picture22.JPG_www.epicfilehost.com

    • Size

      202KB

    • MD5

      22b6b57cdb76d009afe4e03833f4efdb

    • SHA1

      070aa9f1ecb2b53e5cd4ffea50b6f43d1df8d197

    • SHA256

      71de123238bfa174acdc350bb308b10e4566905ce74168010a420eec9ce36e0d

    • SHA512

      37aaebef5a36c4c934926fd075e674486a7dc3ca828704261d63a30ba3821e19e5d0256e834d325bca644eb3167661528f13cad02d89e78eba6787eee98f8216

    • SSDEEP

      3072:LDnsNLa+VJiA5NNXBMRiOo5gZFqfgXTx7ZtnabuPmZHQC528pSqG4/mcY:8aO9xOoyzQYRZJgfJQC57e4w

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks