General

  • Target

    e5c45e21ebef55ec19c35c50c4703265_JaffaCakes118

  • Size

    374KB

  • Sample

    240916-3ljbjswbkn

  • MD5

    e5c45e21ebef55ec19c35c50c4703265

  • SHA1

    a973875a2485c4c04e548a3706d10623724977f8

  • SHA256

    147db46ec36f2d568462d019daac70fa2eb50a7534dbdf1603ecb078c16b9fd5

  • SHA512

    83aa9b1dd7e8125a3cc3eb830fcd0ef3639bcc2db26f70480a1de694939a4f3c5af024846d5dd77a0a80cc88e0a4e2091dddc1e90f8dabaf2b20fffc2506476f

  • SSDEEP

    6144:lDWHN0BEEbZX0Jz8RPR1iL/CW3e0dZfFgCZTdsmnElxEI8y8t7mJHbQ6rpMzgZYf:ciZX0JzSPRa1dTdxGmnOxH8TlaQww8t8

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      e5c45e21ebef55ec19c35c50c4703265_JaffaCakes118

    • Size

      374KB

    • MD5

      e5c45e21ebef55ec19c35c50c4703265

    • SHA1

      a973875a2485c4c04e548a3706d10623724977f8

    • SHA256

      147db46ec36f2d568462d019daac70fa2eb50a7534dbdf1603ecb078c16b9fd5

    • SHA512

      83aa9b1dd7e8125a3cc3eb830fcd0ef3639bcc2db26f70480a1de694939a4f3c5af024846d5dd77a0a80cc88e0a4e2091dddc1e90f8dabaf2b20fffc2506476f

    • SSDEEP

      6144:lDWHN0BEEbZX0Jz8RPR1iL/CW3e0dZfFgCZTdsmnElxEI8y8t7mJHbQ6rpMzgZYf:ciZX0JzSPRa1dTdxGmnOxH8TlaQww8t8

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks