General

  • Target

    a235ef9f79049efb592352b935ba325a_JaffaCakes118

  • Size

    796KB

  • Sample

    241126-qr7j4szkam

  • MD5

    a235ef9f79049efb592352b935ba325a

  • SHA1

    639052ce77c57626483ed18b256705545d9984dd

  • SHA256

    04a17c7216a19cc38926b4d49b4de0e42b23ca46eb5877c1e95682b85cb4f9da

  • SHA512

    66e2ba3d35fd878012785725b9f668d45b876ae154537502dce0bf8d40eda948d4a0b40094f210bc426dc302109acecc6ac3c1e54721be8eac22db6f863e9f83

  • SSDEEP

    12288:4EJO7K9kgW7DZPH9dbHCSUlSKDOra2SJkltJpiyMAPBlTxC+Q0E9XS:4EX9lmDZPHeSpaOoJgXpiyMElgv9X

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      a235ef9f79049efb592352b935ba325a_JaffaCakes118

    • Size

      796KB

    • MD5

      a235ef9f79049efb592352b935ba325a

    • SHA1

      639052ce77c57626483ed18b256705545d9984dd

    • SHA256

      04a17c7216a19cc38926b4d49b4de0e42b23ca46eb5877c1e95682b85cb4f9da

    • SHA512

      66e2ba3d35fd878012785725b9f668d45b876ae154537502dce0bf8d40eda948d4a0b40094f210bc426dc302109acecc6ac3c1e54721be8eac22db6f863e9f83

    • SSDEEP

      12288:4EJO7K9kgW7DZPH9dbHCSUlSKDOra2SJkltJpiyMAPBlTxC+Q0E9XS:4EX9lmDZPHeSpaOoJgXpiyMElgv9X

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks