General

  • Target

    f33d7fa99a3de0e3a3f481e9799a596f_JaffaCakes118

  • Size

    222KB

  • Sample

    240924-kgajqsxerj

  • MD5

    f33d7fa99a3de0e3a3f481e9799a596f

  • SHA1

    e3df5c510b92afc92f6839d899131620f4573ed8

  • SHA256

    02ecf739dae334cbfc0f01bd08c4611ba2d7a4a2e39089a1fb807569637605ea

  • SHA512

    8225888c4bef16a55faa9b8893e1bd401e9c4f3a043065fda472cd058816527022a0b462bc1ea3edaa54f562919fa7f542fb59afff456df8aa7b6fac5bb177c0

  • SSDEEP

    6144:7NLX+ubmtMhCay/5+BVwyFuK3w20zBbW0fapJXScLAqJfD:7Nbdh1yx+AK3w20Va0i3x

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      f33d7fa99a3de0e3a3f481e9799a596f_JaffaCakes118

    • Size

      222KB

    • MD5

      f33d7fa99a3de0e3a3f481e9799a596f

    • SHA1

      e3df5c510b92afc92f6839d899131620f4573ed8

    • SHA256

      02ecf739dae334cbfc0f01bd08c4611ba2d7a4a2e39089a1fb807569637605ea

    • SHA512

      8225888c4bef16a55faa9b8893e1bd401e9c4f3a043065fda472cd058816527022a0b462bc1ea3edaa54f562919fa7f542fb59afff456df8aa7b6fac5bb177c0

    • SSDEEP

      6144:7NLX+ubmtMhCay/5+BVwyFuK3w20zBbW0fapJXScLAqJfD:7Nbdh1yx+AK3w20Va0i3x

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks