General

  • Target

    e6779e752414de3c7e71508a1d563838_JaffaCakes118

  • Size

    196KB

  • Sample

    240917-kxbfzavckn

  • MD5

    e6779e752414de3c7e71508a1d563838

  • SHA1

    4ed9ce093526268c6b2711b7561e64a630147a0e

  • SHA256

    bf030221ad4286dcaf60fa0380e079ca5e1765585a26d82a36bd8f127d75b36b

  • SHA512

    c1530c47d2fd7b82bab4a1f95851a24f31d4582ce728b7d017390bf17f5a448cb7e0ba46b2c017da72f7be64fdadea3c75c1eba9bd5310a1bce7e460f84686b3

  • SSDEEP

    3072:jrbjo5Ia5p1KFQQfguhH4bKLdN7fNQKtLsQ2pSZdijFHzn5PBPCrOBcs8vnlKf19:HYv5yqYH4bKdN/tLsLpOuFTnjPuTJvAn

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      e6779e752414de3c7e71508a1d563838_JaffaCakes118

    • Size

      196KB

    • MD5

      e6779e752414de3c7e71508a1d563838

    • SHA1

      4ed9ce093526268c6b2711b7561e64a630147a0e

    • SHA256

      bf030221ad4286dcaf60fa0380e079ca5e1765585a26d82a36bd8f127d75b36b

    • SHA512

      c1530c47d2fd7b82bab4a1f95851a24f31d4582ce728b7d017390bf17f5a448cb7e0ba46b2c017da72f7be64fdadea3c75c1eba9bd5310a1bce7e460f84686b3

    • SSDEEP

      3072:jrbjo5Ia5p1KFQQfguhH4bKLdN7fNQKtLsQ2pSZdijFHzn5PBPCrOBcs8vnlKf19:HYv5yqYH4bKdN/tLsLpOuFTnjPuTJvAn

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks