General

  • Target

    951392f030fd30c04cfa66288eedf594_JaffaCakes118

  • Size

    109KB

  • Sample

    241124-q5bdtsynbk

  • MD5

    951392f030fd30c04cfa66288eedf594

  • SHA1

    37f99483bc893615948731653f725eeb6f702c16

  • SHA256

    3094dca10fa0eea46d0ce82555d6a6e6790716da086190f138e9fb8ae98037fd

  • SHA512

    9e33dad030f8c204304674eb6d28f9f41425adae2f12c0136b4097dd3ad5580ea3c163a5707f5ef0de3b6e946085a2156d0ac22bec3ee34376f0bde7876811f1

  • SSDEEP

    1536:kCbKkK5KSe0L+jHes8GFN9dD6uEe4UuRbfBfp6NW9wbOjHz6iUH7IkAd6mWBnout:kCe5odfIuEXUuZD6DG6iUH7TAozout

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      951392f030fd30c04cfa66288eedf594_JaffaCakes118

    • Size

      109KB

    • MD5

      951392f030fd30c04cfa66288eedf594

    • SHA1

      37f99483bc893615948731653f725eeb6f702c16

    • SHA256

      3094dca10fa0eea46d0ce82555d6a6e6790716da086190f138e9fb8ae98037fd

    • SHA512

      9e33dad030f8c204304674eb6d28f9f41425adae2f12c0136b4097dd3ad5580ea3c163a5707f5ef0de3b6e946085a2156d0ac22bec3ee34376f0bde7876811f1

    • SSDEEP

      1536:kCbKkK5KSe0L+jHes8GFN9dD6uEe4UuRbfBfp6NW9wbOjHz6iUH7IkAd6mWBnout:kCe5odfIuEXUuZD6DG6iUH7TAozout

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Modifies firewall policy service

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks