General

  • Target

    8e6dc479f409c8f54869ec7d4378bfc7_JaffaCakes118

  • Size

    170KB

  • Sample

    241104-bmsstsslel

  • MD5

    8e6dc479f409c8f54869ec7d4378bfc7

  • SHA1

    16cab39b39712217515f845e72de4f211722ef5e

  • SHA256

    9f69504cc933d99732379b6e814736c96232017c4327b80d8c4c88a5ab5bdacf

  • SHA512

    bf343f41573d79a6a8817c9c346206039400af92cc469e2350350ef58062cd7fe3cf583b808f95fc8b3baed8a8d8ed4c7ae6fce578acb8387fc2cfcd813594e3

  • SSDEEP

    3072:/2UPT6y+x9vjc6gA3SdQCvdOsg0Dd9NddhrEO81fJWWwi9:NTa9vjDgWS5dDrRrE9foQ

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      8e6dc479f409c8f54869ec7d4378bfc7_JaffaCakes118

    • Size

      170KB

    • MD5

      8e6dc479f409c8f54869ec7d4378bfc7

    • SHA1

      16cab39b39712217515f845e72de4f211722ef5e

    • SHA256

      9f69504cc933d99732379b6e814736c96232017c4327b80d8c4c88a5ab5bdacf

    • SHA512

      bf343f41573d79a6a8817c9c346206039400af92cc469e2350350ef58062cd7fe3cf583b808f95fc8b3baed8a8d8ed4c7ae6fce578acb8387fc2cfcd813594e3

    • SSDEEP

      3072:/2UPT6y+x9vjc6gA3SdQCvdOsg0Dd9NddhrEO81fJWWwi9:NTa9vjDgWS5dDrRrE9foQ

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks