General

  • Target

    e252b7b4ded60127cc7055e7ebdc2c24_JaffaCakes118

  • Size

    172KB

  • Sample

    240915-m2eqas1cpn

  • MD5

    e252b7b4ded60127cc7055e7ebdc2c24

  • SHA1

    cf34fc6879a71f9eac3763dd2b1f6be897501dcd

  • SHA256

    7b7617175b4ce06c090994f79a7fe6277a9fdfc21ff69c553de4efd0c18e9701

  • SHA512

    f8de390e7ecd9248f00ed082ff77baec342412975b790e5ec1874529e6741b282ede809588380242c0cd75e70f2fa44efb361a120e7b678eba90510155eeadfa

  • SSDEEP

    3072:3KBVVCwNN7U8l6i4SlWOun4eDurDCDXIbBA0b8XxfJYJA:68m7OslWOteFUbBAuAxfp

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      e252b7b4ded60127cc7055e7ebdc2c24_JaffaCakes118

    • Size

      172KB

    • MD5

      e252b7b4ded60127cc7055e7ebdc2c24

    • SHA1

      cf34fc6879a71f9eac3763dd2b1f6be897501dcd

    • SHA256

      7b7617175b4ce06c090994f79a7fe6277a9fdfc21ff69c553de4efd0c18e9701

    • SHA512

      f8de390e7ecd9248f00ed082ff77baec342412975b790e5ec1874529e6741b282ede809588380242c0cd75e70f2fa44efb361a120e7b678eba90510155eeadfa

    • SSDEEP

      3072:3KBVVCwNN7U8l6i4SlWOun4eDurDCDXIbBA0b8XxfJYJA:68m7OslWOteFUbBAuAxfp

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks