General

  • Target

    eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118

  • Size

    202KB

  • Sample

    240920-3srw9svgjq

  • MD5

    eeaba3069fe6a11457a9094bdcaced6f

  • SHA1

    20a9c5191d7548f190ef17eb063f8274d669bfa5

  • SHA256

    424cf87edbb3b884ac5b7723730563e9bb9b2823de729b59510e34b78f27854e

  • SHA512

    f5efc8e993bf701fc710db97c433bccf133eee0c80b01297cc4f1c5b8d86c953be4fe6a207c92be036222c980115bbb2d098227a38a344c7483d91be25dd145a

  • SSDEEP

    3072:t7PlB5s1PPDZlzxBr7o2vOSl1UeCO1vTwP+E4nKiG1TrV6TwICqjz:BK1PrZlzxJ7PlrB1rfOrYwG

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118

    • Size

      202KB

    • MD5

      eeaba3069fe6a11457a9094bdcaced6f

    • SHA1

      20a9c5191d7548f190ef17eb063f8274d669bfa5

    • SHA256

      424cf87edbb3b884ac5b7723730563e9bb9b2823de729b59510e34b78f27854e

    • SHA512

      f5efc8e993bf701fc710db97c433bccf133eee0c80b01297cc4f1c5b8d86c953be4fe6a207c92be036222c980115bbb2d098227a38a344c7483d91be25dd145a

    • SSDEEP

      3072:t7PlB5s1PPDZlzxBr7o2vOSl1UeCO1vTwP+E4nKiG1TrV6TwICqjz:BK1PrZlzxJ7PlrB1rfOrYwG

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks