General

  • Target

    ef65c77451ecf919c30864fc215c6188_JaffaCakes118

  • Size

    168KB

  • Sample

    240921-j76jesshjj

  • MD5

    ef65c77451ecf919c30864fc215c6188

  • SHA1

    606e4dd7206ed37d7ea87e7ba19a7fbfe52537db

  • SHA256

    dace7d16828fa45cc5670bf75d72a113a8223415400aaa2f8a30f6aa5e312482

  • SHA512

    b5f1c981f2956614f2f1d9d7ba34980e23732738508192973b31efc0b357fe5e5b9294a08fe75d0ad3b392c8536891ac6b01e08a05937f80c09f7ea4aa0f3e57

  • SSDEEP

    1536:2ND7ezsDNvgGUeFyNd5rQjnQqKTBeOFNWHtfdwI0COf2Ie2krmvG/gKMXpH3kmoN:wdUeFkQj9EBeOeHtL2hmjyXKLoSfWM

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      ef65c77451ecf919c30864fc215c6188_JaffaCakes118

    • Size

      168KB

    • MD5

      ef65c77451ecf919c30864fc215c6188

    • SHA1

      606e4dd7206ed37d7ea87e7ba19a7fbfe52537db

    • SHA256

      dace7d16828fa45cc5670bf75d72a113a8223415400aaa2f8a30f6aa5e312482

    • SHA512

      b5f1c981f2956614f2f1d9d7ba34980e23732738508192973b31efc0b357fe5e5b9294a08fe75d0ad3b392c8536891ac6b01e08a05937f80c09f7ea4aa0f3e57

    • SSDEEP

      1536:2ND7ezsDNvgGUeFyNd5rQjnQqKTBeOFNWHtfdwI0COf2Ie2krmvG/gKMXpH3kmoN:wdUeFkQj9EBeOeHtL2hmjyXKLoSfWM

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks