General

  • Target

    d78dd07179cf34583f991232d8fa2b73_JaffaCakes118

  • Size

    217KB

  • Sample

    240910-eh9gkaxdkg

  • MD5

    d78dd07179cf34583f991232d8fa2b73

  • SHA1

    7d38f30a28bccce31d9813ddb74e8c72469ffea5

  • SHA256

    ad1bb3824ae8475e0788497e04aae91c44c8293cceb74baf3a84308e7bb19ec1

  • SHA512

    a610c4f12dc8fe52295a539ef9adf369b5171e00af81c9d3d14d4a512d99a825c0dce75ea9c68de3eb91daee9e155976e79d0eef85a8141e11fb57c3e7830b01

  • SSDEEP

    3072:3FZMTfUcRGbzUCKFh0ZnyfxZY42fIPEwqa6Idn9CcbrXxuDQWVilY3QvdQCzo+p7:qf6zTyf4DiEwqabdnXrxZYqvcIO

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      d78dd07179cf34583f991232d8fa2b73_JaffaCakes118

    • Size

      217KB

    • MD5

      d78dd07179cf34583f991232d8fa2b73

    • SHA1

      7d38f30a28bccce31d9813ddb74e8c72469ffea5

    • SHA256

      ad1bb3824ae8475e0788497e04aae91c44c8293cceb74baf3a84308e7bb19ec1

    • SHA512

      a610c4f12dc8fe52295a539ef9adf369b5171e00af81c9d3d14d4a512d99a825c0dce75ea9c68de3eb91daee9e155976e79d0eef85a8141e11fb57c3e7830b01

    • SSDEEP

      3072:3FZMTfUcRGbzUCKFh0ZnyfxZY42fIPEwqa6Idn9CcbrXxuDQWVilY3QvdQCzo+p7:qf6zTyf4DiEwqabdnXrxZYqvcIO

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks