General

  • Target

    eba1c86285046e369dae00b659ac7800_JaffaCakes118

  • Size

    229KB

  • Sample

    240919-sxd6vswbpc

  • MD5

    eba1c86285046e369dae00b659ac7800

  • SHA1

    3826bfe0ffa7bfdecc88b50fea7a5dd8d1e7b544

  • SHA256

    598344a584bd67aed4a5188e0471bbca9242e145efe075348df3236be73de9c7

  • SHA512

    7ebba13f1f1aeaa2f33a9cb68e3bfc019e8bab5fb5b35b28299870e6713d5bb0072e3fc39c26c7f3279c365405046d646f86a684cbea3178efab4d1805129573

  • SSDEEP

    6144:IkbpuZ9khCYmZ0bDyGj9EylVv9wtGaVCo7Ksvm:ZbYZ9ok0ffjiyv92d

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      eba1c86285046e369dae00b659ac7800_JaffaCakes118

    • Size

      229KB

    • MD5

      eba1c86285046e369dae00b659ac7800

    • SHA1

      3826bfe0ffa7bfdecc88b50fea7a5dd8d1e7b544

    • SHA256

      598344a584bd67aed4a5188e0471bbca9242e145efe075348df3236be73de9c7

    • SHA512

      7ebba13f1f1aeaa2f33a9cb68e3bfc019e8bab5fb5b35b28299870e6713d5bb0072e3fc39c26c7f3279c365405046d646f86a684cbea3178efab4d1805129573

    • SSDEEP

      6144:IkbpuZ9khCYmZ0bDyGj9EylVv9wtGaVCo7Ksvm:ZbYZ9ok0ffjiyv92d

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks