General

  • Target

    8b083337a75701127213980bf073af98_JaffaCakes118

  • Size

    167KB

  • Sample

    241103-mmqt1ssand

  • MD5

    8b083337a75701127213980bf073af98

  • SHA1

    b1f4cddbafb925fda1810753b84d09ad5a2594bf

  • SHA256

    f43bcaf48a88d89de359ecaffcef8fd9f9f66ea196e9f3713de2a24f9cea291b

  • SHA512

    a8c14aabf1f560cb26c5647b31f7160ac610c152ab75e620274592347fd931566afdcfd6cc5f1826d48250a3cc845d6bf0c7163194775c8581ecd9733176202f

  • SSDEEP

    3072:mGEEhQ0P3GiKaSsi9jpTXHjed+XPDKKxM4qcWyBVbZ7nTWuZvF0JcCuZ:mGaiWiKaSL9jVTy+XPDZM4qGz9TWITCm

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      8b083337a75701127213980bf073af98_JaffaCakes118

    • Size

      167KB

    • MD5

      8b083337a75701127213980bf073af98

    • SHA1

      b1f4cddbafb925fda1810753b84d09ad5a2594bf

    • SHA256

      f43bcaf48a88d89de359ecaffcef8fd9f9f66ea196e9f3713de2a24f9cea291b

    • SHA512

      a8c14aabf1f560cb26c5647b31f7160ac610c152ab75e620274592347fd931566afdcfd6cc5f1826d48250a3cc845d6bf0c7163194775c8581ecd9733176202f

    • SSDEEP

      3072:mGEEhQ0P3GiKaSsi9jpTXHjed+XPDKKxM4qcWyBVbZ7nTWuZvF0JcCuZ:mGaiWiKaSL9jVTy+XPDZM4qGz9TWITCm

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks