General

  • Target

    f8a1a6d1f4c5e0140ba0f031e0619c1f_JaffaCakes118

  • Size

    199KB

  • Sample

    240926-sh6mkawhjg

  • MD5

    f8a1a6d1f4c5e0140ba0f031e0619c1f

  • SHA1

    a4abfe05265cdb6a61fc47a852a84f22ef4e0419

  • SHA256

    e53e4993c6b7198cc04f7efd0623b2555d9c9cdf6d421212386a2a4bc201ce4e

  • SHA512

    1a16b277489a5193f0ff20d7d19b122b561ad7cb7a4ed70258c31a0e6bbbf9814b29ea9a516c7683aca0a67852507be2b9f83528fd5dda809200889504b9685a

  • SSDEEP

    6144:6p4Eh3MEP6TnqnJHqeH9MBt9MDKJjJaOa:U4Eh3vgeqHODKJjJaOa

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      f8a1a6d1f4c5e0140ba0f031e0619c1f_JaffaCakes118

    • Size

      199KB

    • MD5

      f8a1a6d1f4c5e0140ba0f031e0619c1f

    • SHA1

      a4abfe05265cdb6a61fc47a852a84f22ef4e0419

    • SHA256

      e53e4993c6b7198cc04f7efd0623b2555d9c9cdf6d421212386a2a4bc201ce4e

    • SHA512

      1a16b277489a5193f0ff20d7d19b122b561ad7cb7a4ed70258c31a0e6bbbf9814b29ea9a516c7683aca0a67852507be2b9f83528fd5dda809200889504b9685a

    • SSDEEP

      6144:6p4Eh3MEP6TnqnJHqeH9MBt9MDKJjJaOa:U4Eh3vgeqHODKJjJaOa

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks