General

  • Target

    ef180c168f9bfc8e334ad91784950ff4_JaffaCakes118

  • Size

    480KB

  • Sample

    240921-ffsayaware

  • MD5

    ef180c168f9bfc8e334ad91784950ff4

  • SHA1

    fd08b7ce4512bda653c4e10338534b235e9707bb

  • SHA256

    88023b07874684bac5c974eacfd6d859ae4cfb4fd7f85029a568ab7c89b9da76

  • SHA512

    e3bd1a814c756b26522d9c2f25db436e12c149989c46e84f04592b2b94cbd8e384a7f708b863b865e893a427b085b8a42abd0dd0d79fe5d6225948f8c4b57ba0

  • SSDEEP

    12288:gaS90fnRCivIFaq8dNivqYLhqDj7QbPpjMkt5FlD:xfRPSXQNmIDj0VjzlD

Malware Config

Extracted

Family

metasploit

Version

encoder/fnstenv_mov

Targets

    • Target

      ef180c168f9bfc8e334ad91784950ff4_JaffaCakes118

    • Size

      480KB

    • MD5

      ef180c168f9bfc8e334ad91784950ff4

    • SHA1

      fd08b7ce4512bda653c4e10338534b235e9707bb

    • SHA256

      88023b07874684bac5c974eacfd6d859ae4cfb4fd7f85029a568ab7c89b9da76

    • SHA512

      e3bd1a814c756b26522d9c2f25db436e12c149989c46e84f04592b2b94cbd8e384a7f708b863b865e893a427b085b8a42abd0dd0d79fe5d6225948f8c4b57ba0

    • SSDEEP

      12288:gaS90fnRCivIFaq8dNivqYLhqDj7QbPpjMkt5FlD:xfRPSXQNmIDj0VjzlD

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Deletes itself

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks