General

  • Target

    ddb8da07adbf0461d6f287d41437e6fe_JaffaCakes118

  • Size

    273KB

  • Sample

    240913-fml3havhln

  • MD5

    ddb8da07adbf0461d6f287d41437e6fe

  • SHA1

    3397b55cd39f86e75fbc13a1320e51110fecf821

  • SHA256

    3920557be7f80c4721bdafa0b84d62443eac74a9c2329e182596b019c13e43e5

  • SHA512

    110c37bf221e6e95efef2994cf95391528fcc188017634abd6b284302c9ce719dbe9fee0a2ba00e1b82990e4b19f05a938d329988dd913c4d3a4efd4a8dac7a1

  • SSDEEP

    3072:8vgd3ISzE12qRI4jK70QJMMWC009u/pByJyABHIfu13+wLSuwqnMVqKRl+cyMuZO:PdYL2JB70Upt98YLwCLLSDqncjX+c8RS

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      ddb8da07adbf0461d6f287d41437e6fe_JaffaCakes118

    • Size

      273KB

    • MD5

      ddb8da07adbf0461d6f287d41437e6fe

    • SHA1

      3397b55cd39f86e75fbc13a1320e51110fecf821

    • SHA256

      3920557be7f80c4721bdafa0b84d62443eac74a9c2329e182596b019c13e43e5

    • SHA512

      110c37bf221e6e95efef2994cf95391528fcc188017634abd6b284302c9ce719dbe9fee0a2ba00e1b82990e4b19f05a938d329988dd913c4d3a4efd4a8dac7a1

    • SSDEEP

      3072:8vgd3ISzE12qRI4jK70QJMMWC009u/pByJyABHIfu13+wLSuwqnMVqKRl+cyMuZO:PdYL2JB70Upt98YLwCLLSDqncjX+c8RS

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks