General

  • Target

    8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118

  • Size

    230KB

  • Sample

    241104-f9z8mstqf1

  • MD5

    8f69bf18abeb7f6df4399ea9442b81ac

  • SHA1

    ad3d2573709166484167deca2275305c345a573d

  • SHA256

    1a36a167bda88e4d6fc041f1485aa6052faad870fc0d4969c6c4df40d023c053

  • SHA512

    4a879875cd543f59d87ff12593eaef8a157b3b87ccb394e9a620aac84b5d784746e9bf2304a9824538f92781411fd4a99e75370fe9268ba49131e9212dad7361

  • SSDEEP

    6144:0JHxEXVvbwEnJl8hB0TTfQLc41dS62os5a7rK2Y96b:WHx6FbtJWhuTqjS8YaXK2Ykb

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      8f69bf18abeb7f6df4399ea9442b81ac_JaffaCakes118

    • Size

      230KB

    • MD5

      8f69bf18abeb7f6df4399ea9442b81ac

    • SHA1

      ad3d2573709166484167deca2275305c345a573d

    • SHA256

      1a36a167bda88e4d6fc041f1485aa6052faad870fc0d4969c6c4df40d023c053

    • SHA512

      4a879875cd543f59d87ff12593eaef8a157b3b87ccb394e9a620aac84b5d784746e9bf2304a9824538f92781411fd4a99e75370fe9268ba49131e9212dad7361

    • SSDEEP

      6144:0JHxEXVvbwEnJl8hB0TTfQLc41dS62os5a7rK2Y96b:WHx6FbtJWhuTqjS8YaXK2Ykb

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks