General

  • Target

    adaddf09ee671f505f65535dc259abc7_JaffaCakes118

  • Size

    273KB

  • Sample

    241128-1k53ta1qhv

  • MD5

    adaddf09ee671f505f65535dc259abc7

  • SHA1

    6048d43765e38307845319eae9e3ae96683b634e

  • SHA256

    b71537c70c11651aa8362581a71f7637f5a9e30df43fccb32173b500c5db099d

  • SHA512

    e21580c787ac2d6b172d28a43b039749bcb39ad4802226c578e9fe6f205433bf7d15e6d934e0dda56671c3995d0d9e83cf6e7e8558dd3c99498a0d01838a0e89

  • SSDEEP

    6144:E0VtQB0VL+Wmt6Te9GQmMHOzhHEsGQe5AQAr4wSg5+8Cv5P8wRX:5/1L+W3eEQKhksGN5qrdSgiH

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      adaddf09ee671f505f65535dc259abc7_JaffaCakes118

    • Size

      273KB

    • MD5

      adaddf09ee671f505f65535dc259abc7

    • SHA1

      6048d43765e38307845319eae9e3ae96683b634e

    • SHA256

      b71537c70c11651aa8362581a71f7637f5a9e30df43fccb32173b500c5db099d

    • SHA512

      e21580c787ac2d6b172d28a43b039749bcb39ad4802226c578e9fe6f205433bf7d15e6d934e0dda56671c3995d0d9e83cf6e7e8558dd3c99498a0d01838a0e89

    • SSDEEP

      6144:E0VtQB0VL+Wmt6Te9GQmMHOzhHEsGQe5AQAr4wSg5+8Cv5P8wRX:5/1L+W3eEQKhksGN5qrdSgiH

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks