General

  • Target

    d98897a487409f8cd6685ab1921e5418_JaffaCakes118

  • Size

    128KB

  • Sample

    240911-d15ewszenr

  • MD5

    d98897a487409f8cd6685ab1921e5418

  • SHA1

    4c5fcbba7df9350bb29e9a266303c4a151036594

  • SHA256

    82ee79c546a05eb714e747aa0b9c9bb9fb551fa72fff7479ad35d7e764a1f174

  • SHA512

    eeaf11632b3dab7b0072bd8cf89cd89e4f76e98e38dd15085d9d9e34cd423be83bfcf3ed15e0b91d2a083ed1730242cda3bbbd0dfa4c8a6057d92353c2178086

  • SSDEEP

    3072:p3ACkdLfeE8yRdBRfe5EmjlYRELmU0bi0q2qnLLxHWtGoi4Df:xB8eXuRfe5EFRELmUki0SLNH69f

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      Picture29.JPG_www.facebook.com

    • Size

      139KB

    • MD5

      255a2ff8712b8def6c7cd7b49afcf277

    • SHA1

      7da7443a4ecad24887adcbc7d80b13dedea7c798

    • SHA256

      29b37b7786abf5cf93cbdd9fe776975fe02aaa380ffb2045087b36711c1cc996

    • SHA512

      c35369f5ac54e8d2d2e75cf9f079d6fcd961de54f3a563e5abda3ca531a183128eead4c75952d4e0e04c2e1d36eb694148630348826af9d2eacd83bb62996e05

    • SSDEEP

      3072:P92aolTgOIShudBRfe5EmjlYRELmU0bi0q2qnaKWE:FXO0Rfe5EFRELmUki0SaKWE

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks