General

  • Target

    f159c382f46c05919a301e23586caad9_JaffaCakes118

  • Size

    201KB

  • Sample

    240922-fysz7atdjh

  • MD5

    f159c382f46c05919a301e23586caad9

  • SHA1

    d837758c35108bc709b368cd01789525d9828ba9

  • SHA256

    b893d2a2ea7f10413c2b6b22bae8855696bf9b7b69feb3387b8cf6580558dd23

  • SHA512

    a31b7eade34112f4deb32fca733744df7f58eb6fc6dbad74de6a3c5db3982dbcc13622478a670b1772d7a62d73bc1febd5e973dde82f0ae835a279f45ef06d12

  • SSDEEP

    3072:BaDpZ+xJi1hHw7U3M4PjuRlMAzjn9disWutnL6v0bAAyZ615vPEuAMjPFUBUGE:BSvhHw7pM0jn9UfuN6v0cBev8ugUGE

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      f159c382f46c05919a301e23586caad9_JaffaCakes118

    • Size

      201KB

    • MD5

      f159c382f46c05919a301e23586caad9

    • SHA1

      d837758c35108bc709b368cd01789525d9828ba9

    • SHA256

      b893d2a2ea7f10413c2b6b22bae8855696bf9b7b69feb3387b8cf6580558dd23

    • SHA512

      a31b7eade34112f4deb32fca733744df7f58eb6fc6dbad74de6a3c5db3982dbcc13622478a670b1772d7a62d73bc1febd5e973dde82f0ae835a279f45ef06d12

    • SSDEEP

      3072:BaDpZ+xJi1hHw7U3M4PjuRlMAzjn9disWutnL6v0bAAyZ615vPEuAMjPFUBUGE:BSvhHw7pM0jn9UfuN6v0cBev8ugUGE

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks