General

  • Target

    96e7a97c1faea19584f8500c5380013b_JaffaCakes118

  • Size

    265KB

  • Sample

    241124-yrfemaspdk

  • MD5

    96e7a97c1faea19584f8500c5380013b

  • SHA1

    bea0e51f31e0832bb448c411b88f6f4f6d51a244

  • SHA256

    4ef2624b6deb1c7e1c0b3f26ee6e30a567a645aa3681e73028da13c62be14a94

  • SHA512

    904931f5e07d67ee4ca906e9b41be8bd730c05827a892c907fe251a3218b6d8b8bcac55c3cdc65322a18df955c6e97babdc4e531bf16cd0a10eb83fe606f4f00

  • SSDEEP

    6144:BKBMwhQPUP79Yme7jj+r48fiYslrNukL1vgYVKvnP:yMUIuYmuD8KYOrNtL1bUP

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      96e7a97c1faea19584f8500c5380013b_JaffaCakes118

    • Size

      265KB

    • MD5

      96e7a97c1faea19584f8500c5380013b

    • SHA1

      bea0e51f31e0832bb448c411b88f6f4f6d51a244

    • SHA256

      4ef2624b6deb1c7e1c0b3f26ee6e30a567a645aa3681e73028da13c62be14a94

    • SHA512

      904931f5e07d67ee4ca906e9b41be8bd730c05827a892c907fe251a3218b6d8b8bcac55c3cdc65322a18df955c6e97babdc4e531bf16cd0a10eb83fe606f4f00

    • SSDEEP

      6144:BKBMwhQPUP79Yme7jj+r48fiYslrNukL1vgYVKvnP:yMUIuYmuD8KYOrNtL1bUP

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks