General

  • Target

    f83e94b0a6ea198f5ebb3ad128ba391f_JaffaCakes118

  • Size

    108KB

  • Sample

    240926-na2anaxcqb

  • MD5

    f83e94b0a6ea198f5ebb3ad128ba391f

  • SHA1

    98949f6c25f3388c60ed61f6952af57d5d3c1c11

  • SHA256

    4d90d35324aae678ef4c92f6644ec2d3e8d1f1d6bd8d1388af6436bca25d865d

  • SHA512

    27d0f43e4c0ec73229c9799fb1d9f72e5953d10c673138fddcb41e7875bbf151e2469362e26b953aac1e439fad08af08b9d241da369f17c0d8d4f4c2d3974e95

  • SSDEEP

    1536:Z+GJEbENMutFGHPieLyk0ndiPtNLloPOm7DDD0/AkXgKjsmf:ZX2IGutTuyk0ndwmpQIkQKjsm

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      f83e94b0a6ea198f5ebb3ad128ba391f_JaffaCakes118

    • Size

      108KB

    • MD5

      f83e94b0a6ea198f5ebb3ad128ba391f

    • SHA1

      98949f6c25f3388c60ed61f6952af57d5d3c1c11

    • SHA256

      4d90d35324aae678ef4c92f6644ec2d3e8d1f1d6bd8d1388af6436bca25d865d

    • SHA512

      27d0f43e4c0ec73229c9799fb1d9f72e5953d10c673138fddcb41e7875bbf151e2469362e26b953aac1e439fad08af08b9d241da369f17c0d8d4f4c2d3974e95

    • SSDEEP

      1536:Z+GJEbENMutFGHPieLyk0ndiPtNLloPOm7DDD0/AkXgKjsmf:ZX2IGutTuyk0ndwmpQIkQKjsm

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks