General

  • Target

    f0f79ce9732c138fd3c0a0b87a15c959_JaffaCakes118

  • Size

    269KB

  • Sample

    240922-bca52athjg

  • MD5

    f0f79ce9732c138fd3c0a0b87a15c959

  • SHA1

    843da60e763e41adcf29b11015750a2ebe61d4d0

  • SHA256

    9b0b5463072d7e88c879bd7f07821a0ef5c2befff9ee06d81e2f4e33a6de63f8

  • SHA512

    f3eb88c146e3cfe55aa5be5bcd10aab8d656a0250f0ee47cf86a47b3d08b64fb5351c4fcffb589c79cb8cdeec57a92bc564af6b9c7240007e27b61f831b0ac92

  • SSDEEP

    6144:F/wZGRTexiv5qo3m04QNr4haGhhjZeib:F2imJhaQb

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      f0f79ce9732c138fd3c0a0b87a15c959_JaffaCakes118

    • Size

      269KB

    • MD5

      f0f79ce9732c138fd3c0a0b87a15c959

    • SHA1

      843da60e763e41adcf29b11015750a2ebe61d4d0

    • SHA256

      9b0b5463072d7e88c879bd7f07821a0ef5c2befff9ee06d81e2f4e33a6de63f8

    • SHA512

      f3eb88c146e3cfe55aa5be5bcd10aab8d656a0250f0ee47cf86a47b3d08b64fb5351c4fcffb589c79cb8cdeec57a92bc564af6b9c7240007e27b61f831b0ac92

    • SSDEEP

      6144:F/wZGRTexiv5qo3m04QNr4haGhhjZeib:F2imJhaQb

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks