General

  • Target

    ef3d6f4bd62f84db332e1d0fbdbb4537_JaffaCakes118

  • Size

    212KB

  • Sample

    240921-hcbj5ayhkf

  • MD5

    ef3d6f4bd62f84db332e1d0fbdbb4537

  • SHA1

    543f4273a69641ebd51d2a0f0bf763f25bb2abe3

  • SHA256

    62d8e098de999619b1398b6b676d5ab3b2e8bda7e187b1d83dbfa7edece280f2

  • SHA512

    8d29de043da9c5cb6e08694d15bca6cb9591da41b7d20a60db579bfd160c9e4394d530a26fd523c5ce777c0340f59962878602125a5a9841830991d475161fcd

  • SSDEEP

    6144:9bAKuUtGfJeurOpVvJ88UzeWs4G+nL1a5:9bAKu2rTvy8U44Gqs

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      ef3d6f4bd62f84db332e1d0fbdbb4537_JaffaCakes118

    • Size

      212KB

    • MD5

      ef3d6f4bd62f84db332e1d0fbdbb4537

    • SHA1

      543f4273a69641ebd51d2a0f0bf763f25bb2abe3

    • SHA256

      62d8e098de999619b1398b6b676d5ab3b2e8bda7e187b1d83dbfa7edece280f2

    • SHA512

      8d29de043da9c5cb6e08694d15bca6cb9591da41b7d20a60db579bfd160c9e4394d530a26fd523c5ce777c0340f59962878602125a5a9841830991d475161fcd

    • SSDEEP

      6144:9bAKuUtGfJeurOpVvJ88UzeWs4G+nL1a5:9bAKu2rTvy8U44Gqs

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks