General

  • Target

    df499130201f21670d4b4cbce68748c2_JaffaCakes118

  • Size

    916KB

  • Sample

    240914-cegaha1hrb

  • MD5

    df499130201f21670d4b4cbce68748c2

  • SHA1

    1525b615b3a31527fbfffa32f4c9e09f3eedc284

  • SHA256

    936df8a9a1e7d4c8ebaa8eb83895c34e2173cccd0ebc9ae8367e4fe16cc5e332

  • SHA512

    62ba3ee41e3d1f4418196d9f9dbeb284c480db62dcee3deb9de4523332890111863843697aacaa1b3d48afc7873fb2a97df38a2db83912ce5957824c5ba669d8

  • SSDEEP

    6144:ssSKU3H/2P3rvLhrtXOdlsCMHxci/DTSAKIATI1NRhsBoIy:hZUXoD1rtSlszF1hAc1NRqB

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      df499130201f21670d4b4cbce68748c2_JaffaCakes118

    • Size

      916KB

    • MD5

      df499130201f21670d4b4cbce68748c2

    • SHA1

      1525b615b3a31527fbfffa32f4c9e09f3eedc284

    • SHA256

      936df8a9a1e7d4c8ebaa8eb83895c34e2173cccd0ebc9ae8367e4fe16cc5e332

    • SHA512

      62ba3ee41e3d1f4418196d9f9dbeb284c480db62dcee3deb9de4523332890111863843697aacaa1b3d48afc7873fb2a97df38a2db83912ce5957824c5ba669d8

    • SSDEEP

      6144:ssSKU3H/2P3rvLhrtXOdlsCMHxci/DTSAKIATI1NRhsBoIy:hZUXoD1rtSlszF1hAc1NRqB

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks