General

  • Target

    e59efc8f260d468c72c87c493e745c92_JaffaCakes118

  • Size

    1.4MB

  • Sample

    240916-1m17ms1fja

  • MD5

    e59efc8f260d468c72c87c493e745c92

  • SHA1

    6714fbc557a9237bb0bb1ea0dfe345e630964fca

  • SHA256

    8c0c0e977d766562eb0e108f28add7905e21076720022647e4b78232829ee022

  • SHA512

    89741f2d855eafa4714aacfc9b122153b9b8ed00d7f55c223a869f6fee405ca9dc383e081fcd4dceb07e590af345d84cb9c18459c88b2aabd6eb80cb049eb5f2

  • SSDEEP

    12288:y33DsecKBVSOePfwplrFwg/7LyJbWc7Si:yHdXOPfAFwgiJCc7

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      e59efc8f260d468c72c87c493e745c92_JaffaCakes118

    • Size

      1.4MB

    • MD5

      e59efc8f260d468c72c87c493e745c92

    • SHA1

      6714fbc557a9237bb0bb1ea0dfe345e630964fca

    • SHA256

      8c0c0e977d766562eb0e108f28add7905e21076720022647e4b78232829ee022

    • SHA512

      89741f2d855eafa4714aacfc9b122153b9b8ed00d7f55c223a869f6fee405ca9dc383e081fcd4dceb07e590af345d84cb9c18459c88b2aabd6eb80cb049eb5f2

    • SSDEEP

      12288:y33DsecKBVSOePfwplrFwg/7LyJbWc7Si:yHdXOPfAFwgiJCc7

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks