General

  • Target

    e1f9aa091985cd7b59432ccbb1b7fd34_JaffaCakes118

  • Size

    625KB

  • Sample

    240915-h878zasekq

  • MD5

    e1f9aa091985cd7b59432ccbb1b7fd34

  • SHA1

    529eb56b97d67f1c124512292b2210512ece3c5d

  • SHA256

    b6530b4fcd3716cc94bc25ab09c8d34c083145424f4ee34123db41bcb9fe6b8e

  • SHA512

    b4c2fe12d34e78903dee25a122faf8d51296c2bc5b9533cca0f632bcefa58c57842ddeb9b04b4ab13b6f27c2ca0065bc211a46127c32bcf4fc898e38d7747231

  • SSDEEP

    12288:EE4E2NoeW6XuHB/7UFjnHIM+gB4GmCiMOBRQ8RTZIg3wPGDMlongmGcUO:EfmeWR/Y9h7ECiZz/RSggeDMmQ5O

Malware Config

Extracted

Family

metasploit

Version

encoder/fnstenv_mov

Targets

    • Target

      e1f9aa091985cd7b59432ccbb1b7fd34_JaffaCakes118

    • Size

      625KB

    • MD5

      e1f9aa091985cd7b59432ccbb1b7fd34

    • SHA1

      529eb56b97d67f1c124512292b2210512ece3c5d

    • SHA256

      b6530b4fcd3716cc94bc25ab09c8d34c083145424f4ee34123db41bcb9fe6b8e

    • SHA512

      b4c2fe12d34e78903dee25a122faf8d51296c2bc5b9533cca0f632bcefa58c57842ddeb9b04b4ab13b6f27c2ca0065bc211a46127c32bcf4fc898e38d7747231

    • SSDEEP

      12288:EE4E2NoeW6XuHB/7UFjnHIM+gB4GmCiMOBRQ8RTZIg3wPGDMlongmGcUO:EfmeWR/Y9h7ECiZz/RSggeDMmQ5O

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks