General

  • Target

    e8bb7b17da6ad2e6c616b77e6c79f9a0_JaffaCakes118

  • Size

    197KB

  • Sample

    240918-knkchsserq

  • MD5

    e8bb7b17da6ad2e6c616b77e6c79f9a0

  • SHA1

    08e833c27ca1895189ff3bdbf401734fb15e8d3e

  • SHA256

    25cf3cc4b9248635cd4237925d69acab1b6851cc08ed081cd07020da8176689d

  • SHA512

    011c7a804b10d80720af07d378e8f38cc2da7d3dc4e2baec2e8658b523a393c49b5ec3ff15b563db14ce15c121fa84f3aebb7c0f4402c327c9dcbbebaca8ba53

  • SSDEEP

    3072:yL+hb026y9cJ9O/y7Ux3Y0fnZEljfXcP9I1cMZsUwOOHNvxIE:ylnUBYAulS61rZwOOfv

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      e8bb7b17da6ad2e6c616b77e6c79f9a0_JaffaCakes118

    • Size

      197KB

    • MD5

      e8bb7b17da6ad2e6c616b77e6c79f9a0

    • SHA1

      08e833c27ca1895189ff3bdbf401734fb15e8d3e

    • SHA256

      25cf3cc4b9248635cd4237925d69acab1b6851cc08ed081cd07020da8176689d

    • SHA512

      011c7a804b10d80720af07d378e8f38cc2da7d3dc4e2baec2e8658b523a393c49b5ec3ff15b563db14ce15c121fa84f3aebb7c0f4402c327c9dcbbebaca8ba53

    • SSDEEP

      3072:yL+hb026y9cJ9O/y7Ux3Y0fnZEljfXcP9I1cMZsUwOOHNvxIE:ylnUBYAulS61rZwOOfv

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks