General

  • Target

    d77e1335f1d149970fc98a89204cfa1a_JaffaCakes118

  • Size

    47KB

  • Sample

    240910-dj7tpavgpf

  • MD5

    d77e1335f1d149970fc98a89204cfa1a

  • SHA1

    b9707ac164724c590540068b0caed3540e079dd3

  • SHA256

    4d7c5b0b5ef553406927f43ddf3794a46983fb637dca663301d30ccd8be66746

  • SHA512

    55f70fae5b382cf6e677ed1139e4d76d3eff6fb47610099f1a434a2e970ce701089d4fe4296f470ead51ada4bec27c792aa1140da6cec94ac1dee22828a8f33a

  • SSDEEP

    768:T5scsxI71Hv2mTEb4YXVzancAloPCx+k2uIuHtod6gWtxVjkeaPnAJWAEnRmtl:T5sc375Ab4EBanICQFuIiyd6gWHpkea5

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      d77e1335f1d149970fc98a89204cfa1a_JaffaCakes118

    • Size

      47KB

    • MD5

      d77e1335f1d149970fc98a89204cfa1a

    • SHA1

      b9707ac164724c590540068b0caed3540e079dd3

    • SHA256

      4d7c5b0b5ef553406927f43ddf3794a46983fb637dca663301d30ccd8be66746

    • SHA512

      55f70fae5b382cf6e677ed1139e4d76d3eff6fb47610099f1a434a2e970ce701089d4fe4296f470ead51ada4bec27c792aa1140da6cec94ac1dee22828a8f33a

    • SSDEEP

      768:T5scsxI71Hv2mTEb4YXVzancAloPCx+k2uIuHtod6gWtxVjkeaPnAJWAEnRmtl:T5sc375Ab4EBanICQFuIiyd6gWHpkea5

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Modifies firewall policy service

    • Modifies security service

    • Network Share Discovery

      Attempt to gather information on host network.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks