General

  • Target

    eb3044f2a5f2e8c23324dbf4f9e233f5_JaffaCakes118

  • Size

    46KB

  • Sample

    240919-m1lgfsvcjf

  • MD5

    eb3044f2a5f2e8c23324dbf4f9e233f5

  • SHA1

    70e6e7c555f71514b7626102c97ca9b10bb16cfe

  • SHA256

    d7b4ace36fb27949da38d4fc0d3a16718d71f02111455b5311303ed9b9836c55

  • SHA512

    629eb7f4f0ba079ffcdf97b453017190186615364e94c011a1b8a98ed1ef6b2cf3f8e9b4e859434e33dface211b5705f705e4afdde77dbe9be5da404969ff520

  • SSDEEP

    768:I/Ek3BUVumvBZM9+3gZu+/+LUBsDnETTVBNg0uMPZYscRr2q3HQ:a32dBZM9+GWUMn0hB0bRrH3

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      eb3044f2a5f2e8c23324dbf4f9e233f5_JaffaCakes118

    • Size

      46KB

    • MD5

      eb3044f2a5f2e8c23324dbf4f9e233f5

    • SHA1

      70e6e7c555f71514b7626102c97ca9b10bb16cfe

    • SHA256

      d7b4ace36fb27949da38d4fc0d3a16718d71f02111455b5311303ed9b9836c55

    • SHA512

      629eb7f4f0ba079ffcdf97b453017190186615364e94c011a1b8a98ed1ef6b2cf3f8e9b4e859434e33dface211b5705f705e4afdde77dbe9be5da404969ff520

    • SSDEEP

      768:I/Ek3BUVumvBZM9+3gZu+/+LUBsDnETTVBNg0uMPZYscRr2q3HQ:a32dBZM9+GWUMn0hB0bRrH3

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks