General

  • Target

    a763573243b374b99bbeed9710709da3_JaffaCakes118

  • Size

    253KB

  • Sample

    241127-mhjvxawnfk

  • MD5

    a763573243b374b99bbeed9710709da3

  • SHA1

    b8c74fc1e56689c1d0ed303ca4deda31a50e5a97

  • SHA256

    a63b74ead0e28dc9b9873cd15e65d656f0694ddfacd0f78965c291d0e87879f9

  • SHA512

    2a877d2ad008534fa963130ad5c866d82852f1fa287f26e525dd9c9a3945a0f400a2aab5e82b38f2d5b329b06cefb304e3c3723fce1e887666170e42d3f2a9f8

  • SSDEEP

    6144:wohZUPi4NiH5rGPm0gTOjpFfu/Db5l/kPjomLT:VhZ+uOXunijL

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      a763573243b374b99bbeed9710709da3_JaffaCakes118

    • Size

      253KB

    • MD5

      a763573243b374b99bbeed9710709da3

    • SHA1

      b8c74fc1e56689c1d0ed303ca4deda31a50e5a97

    • SHA256

      a63b74ead0e28dc9b9873cd15e65d656f0694ddfacd0f78965c291d0e87879f9

    • SHA512

      2a877d2ad008534fa963130ad5c866d82852f1fa287f26e525dd9c9a3945a0f400a2aab5e82b38f2d5b329b06cefb304e3c3723fce1e887666170e42d3f2a9f8

    • SSDEEP

      6144:wohZUPi4NiH5rGPm0gTOjpFfu/Db5l/kPjomLT:VhZ+uOXunijL

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks