General

  • Target

    8d5122c138c32dc5ea4552db7d07efd5_JaffaCakes118

  • Size

    47KB

  • Sample

    241103-y34llawlfl

  • MD5

    8d5122c138c32dc5ea4552db7d07efd5

  • SHA1

    222094a08700f80d5a4d6d2860206ac24d4d4da3

  • SHA256

    de24be2d94840040aa6d90ef65db61aaa5b1f64c6572a329562826ae2f35576e

  • SHA512

    0576e42615309cd63f32e9936b6ff9ecd1d347ddd105615060676f444a542f6b44c59afaffc61ab69896fccab5d42a506263c21f750da5a03ffedd64f0930002

  • SSDEEP

    768:z5scsxI71Hv2mTEb4YXVzancAloPCx+k2uIuHtod6gWtxVjkeaPnAJWAEnRmtl:z5sc375Ab4EBanICQFuIiyd6gWHpkea5

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      8d5122c138c32dc5ea4552db7d07efd5_JaffaCakes118

    • Size

      47KB

    • MD5

      8d5122c138c32dc5ea4552db7d07efd5

    • SHA1

      222094a08700f80d5a4d6d2860206ac24d4d4da3

    • SHA256

      de24be2d94840040aa6d90ef65db61aaa5b1f64c6572a329562826ae2f35576e

    • SHA512

      0576e42615309cd63f32e9936b6ff9ecd1d347ddd105615060676f444a542f6b44c59afaffc61ab69896fccab5d42a506263c21f750da5a03ffedd64f0930002

    • SSDEEP

      768:z5scsxI71Hv2mTEb4YXVzancAloPCx+k2uIuHtod6gWtxVjkeaPnAJWAEnRmtl:z5sc375Ab4EBanICQFuIiyd6gWHpkea5

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Modifies firewall policy service

    • Modifies security service

    • Network Share Discovery

      Attempt to gather information on host network.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks