General

  • Target

    e7e82884b113c91a14f2e4d10f899a12_JaffaCakes118

  • Size

    87KB

  • Sample

    240917-3jce8a1dmr

  • MD5

    e7e82884b113c91a14f2e4d10f899a12

  • SHA1

    41fe7682d2b5ddfa9e91dc5bc54ec7ae70b3f440

  • SHA256

    1b55a58a6fd80ec1b7616ff5c52e752dfe090ba2519b7d222efc4660f2e2e4e5

  • SHA512

    e25841b1715180cf05f3df3dde841f0ddb5ce1e60ac56d9987fb5ce12999eb1f8f6967b84683645990483cb8138ec91e5e3a387f719110ded7e1acc22fa7fc19

  • SSDEEP

    1536:7mPAiV8eFCROIRcZc1Az2ubSC+qF0ebEAdG8ZhyXAA:7mPpV88PyL1Az2CSC+xAdXh

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      e7e82884b113c91a14f2e4d10f899a12_JaffaCakes118

    • Size

      87KB

    • MD5

      e7e82884b113c91a14f2e4d10f899a12

    • SHA1

      41fe7682d2b5ddfa9e91dc5bc54ec7ae70b3f440

    • SHA256

      1b55a58a6fd80ec1b7616ff5c52e752dfe090ba2519b7d222efc4660f2e2e4e5

    • SHA512

      e25841b1715180cf05f3df3dde841f0ddb5ce1e60ac56d9987fb5ce12999eb1f8f6967b84683645990483cb8138ec91e5e3a387f719110ded7e1acc22fa7fc19

    • SSDEEP

      1536:7mPAiV8eFCROIRcZc1Az2ubSC+qF0ebEAdG8ZhyXAA:7mPpV88PyL1Az2CSC+xAdXh

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks