General

  • Target

    e23157efe041a73c68ceaf2b5074db65_JaffaCakes118

  • Size

    173KB

  • Sample

    240915-lpkkcaxgpp

  • MD5

    e23157efe041a73c68ceaf2b5074db65

  • SHA1

    f5f8ee6414e5fd16bdf602dbf6963403986e2273

  • SHA256

    9300d6b3aa972e79da286df5b1cb3345529cf2d1cbf09c2e7f7e38e096e48ac5

  • SHA512

    80f96914831985adb1c5db6227c98d7f6b9aa12a884b0930ca1a0e0551f901b1e89e9af4b4eb7e2cff468e0e246964d1edf389d366cc95f24ca2e4c1d9a3f423

  • SSDEEP

    3072:UnnA9CEAi+ylfLDtS/SkBgLAhrjLD12WpciDMa2t5tpmhpAUAC5XQ7M:UcCPI8ZeEJ128972/tpC/ASQ7M

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      e23157efe041a73c68ceaf2b5074db65_JaffaCakes118

    • Size

      173KB

    • MD5

      e23157efe041a73c68ceaf2b5074db65

    • SHA1

      f5f8ee6414e5fd16bdf602dbf6963403986e2273

    • SHA256

      9300d6b3aa972e79da286df5b1cb3345529cf2d1cbf09c2e7f7e38e096e48ac5

    • SHA512

      80f96914831985adb1c5db6227c98d7f6b9aa12a884b0930ca1a0e0551f901b1e89e9af4b4eb7e2cff468e0e246964d1edf389d366cc95f24ca2e4c1d9a3f423

    • SSDEEP

      3072:UnnA9CEAi+ylfLDtS/SkBgLAhrjLD12WpciDMa2t5tpmhpAUAC5XQ7M:UcCPI8ZeEJ128972/tpC/ASQ7M

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks