General

  • Target

    dcf23f4b8d8c2ac747b83d65afcf5e77_JaffaCakes118

  • Size

    380KB

  • Sample

    240912-ymr8ma1fmq

  • MD5

    dcf23f4b8d8c2ac747b83d65afcf5e77

  • SHA1

    86d032a7ce61f34b880908d441b85856c4234ee0

  • SHA256

    eb2ec9859d7c87b0f71b1616fc481a2a0226d4403e3f4894218a394f32269199

  • SHA512

    6295a17edc8ebda7af13ea82b035bc7aae92dd9dc0c0737ac05fd2ebec12b604b9ac8e187bd85da7ed66d2be61324fc6c21f81566ada92e0039450a18abf34c7

  • SSDEEP

    6144:WRjfpbvNzGn6+MT1k6CW3e0dZfFgCZTdsmnElX9mzHsmaEJFLaXupTR5QWfdH:WRjfHza6+M5ko1dTdxGmnOX9uhL+KT4c

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      dcf23f4b8d8c2ac747b83d65afcf5e77_JaffaCakes118

    • Size

      380KB

    • MD5

      dcf23f4b8d8c2ac747b83d65afcf5e77

    • SHA1

      86d032a7ce61f34b880908d441b85856c4234ee0

    • SHA256

      eb2ec9859d7c87b0f71b1616fc481a2a0226d4403e3f4894218a394f32269199

    • SHA512

      6295a17edc8ebda7af13ea82b035bc7aae92dd9dc0c0737ac05fd2ebec12b604b9ac8e187bd85da7ed66d2be61324fc6c21f81566ada92e0039450a18abf34c7

    • SSDEEP

      6144:WRjfpbvNzGn6+MT1k6CW3e0dZfFgCZTdsmnElX9mzHsmaEJFLaXupTR5QWfdH:WRjfHza6+M5ko1dTdxGmnOX9uhL+KT4c

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks