General

  • Target

    064684d7d9899aafc87f1205b6462d33_JaffaCakes118

  • Size

    1.3MB

  • Sample

    241001-sdaz4azbmf

  • MD5

    064684d7d9899aafc87f1205b6462d33

  • SHA1

    ac2e46e128089352244d7d8a8cdc7d94a2541a28

  • SHA256

    063d9efd46ea1a0f8375635c9fdaa080145423f5bf92d03e94792d2be12e08a9

  • SHA512

    1c37e7f0e5b9afe1ebdb1221f3e5383b227c3f23cd4146eb1e38af4300791218b2ad83065eca06d62e5eca747f21633c14fb54d003353b90049cc1e909c7b6bd

  • SSDEEP

    24576:tnIv0BXPHrlyOcjJyiW0ary509/+j3lomwu9dLNcw8r1kXDZt+jpAl7zRg:q8B/hWraK0gj3Kmw8ApEDWj07m

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      064684d7d9899aafc87f1205b6462d33_JaffaCakes118

    • Size

      1.3MB

    • MD5

      064684d7d9899aafc87f1205b6462d33

    • SHA1

      ac2e46e128089352244d7d8a8cdc7d94a2541a28

    • SHA256

      063d9efd46ea1a0f8375635c9fdaa080145423f5bf92d03e94792d2be12e08a9

    • SHA512

      1c37e7f0e5b9afe1ebdb1221f3e5383b227c3f23cd4146eb1e38af4300791218b2ad83065eca06d62e5eca747f21633c14fb54d003353b90049cc1e909c7b6bd

    • SSDEEP

      24576:tnIv0BXPHrlyOcjJyiW0ary509/+j3lomwu9dLNcw8r1kXDZt+jpAl7zRg:q8B/hWraK0gj3Kmw8ApEDWj07m

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks