General

  • Target

    d37902c8d1875e704747b08507698a7f_JaffaCakes118

  • Size

    92KB

  • Sample

    240908-ed34zsvark

  • MD5

    d37902c8d1875e704747b08507698a7f

  • SHA1

    254ee8c9054bb2d9fe9145dfcf4b0570af3350f2

  • SHA256

    f5163b70408646e7ecaed1bb865784a729afeae5709d682b5b5a112979a16280

  • SHA512

    4487fcf797e7cff99331cc2d90aba296c254e1210ce4bbcc44cb1e26d09e321a3779d5ed074232cfff606c2891d8aaa7f5cc761640e5b2338e041a22c6fc6bd1

  • SSDEEP

    1536:udt/W4zCHFxM9ZLawqthNUxfZWT2D988dhOyZ+25uBA9YdOgoRMtvZbppI1Uzfay:aTzClO9IDthSt08LOgZoA9Uk05ppEUzv

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      d37902c8d1875e704747b08507698a7f_JaffaCakes118

    • Size

      92KB

    • MD5

      d37902c8d1875e704747b08507698a7f

    • SHA1

      254ee8c9054bb2d9fe9145dfcf4b0570af3350f2

    • SHA256

      f5163b70408646e7ecaed1bb865784a729afeae5709d682b5b5a112979a16280

    • SHA512

      4487fcf797e7cff99331cc2d90aba296c254e1210ce4bbcc44cb1e26d09e321a3779d5ed074232cfff606c2891d8aaa7f5cc761640e5b2338e041a22c6fc6bd1

    • SSDEEP

      1536:udt/W4zCHFxM9ZLawqthNUxfZWT2D988dhOyZ+25uBA9YdOgoRMtvZbppI1Uzfay:aTzClO9IDthSt08LOgZoA9Uk05ppEUzv

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks