General

  • Target

    ad2b9d630163cf0518bf552d3e625eaa_JaffaCakes118

  • Size

    194KB

  • Sample

    241128-wsmtzs1ldr

  • MD5

    ad2b9d630163cf0518bf552d3e625eaa

  • SHA1

    d9b49eac3f6586bfa2c1ca3816f312af18e36634

  • SHA256

    11ac431348d0a3cc757d7a4a1c7de0393b4264b50377170892bea6856eb07083

  • SHA512

    74c9aea9233969442b3157e0a09025e680f33991bcf32d252e8e4a6a89e8757d9e3d30e4410dac9e4f73efc46a6ded4f41d0fc0eb12359c2b893eb4104c7ef37

  • SSDEEP

    6144:wiUgjDjaexDARlQkhEETbsFtuf4MY4yQIE:fUoDmeWDyE8FtI4MY79E

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      ad2b9d630163cf0518bf552d3e625eaa_JaffaCakes118

    • Size

      194KB

    • MD5

      ad2b9d630163cf0518bf552d3e625eaa

    • SHA1

      d9b49eac3f6586bfa2c1ca3816f312af18e36634

    • SHA256

      11ac431348d0a3cc757d7a4a1c7de0393b4264b50377170892bea6856eb07083

    • SHA512

      74c9aea9233969442b3157e0a09025e680f33991bcf32d252e8e4a6a89e8757d9e3d30e4410dac9e4f73efc46a6ded4f41d0fc0eb12359c2b893eb4104c7ef37

    • SSDEEP

      6144:wiUgjDjaexDARlQkhEETbsFtuf4MY4yQIE:fUoDmeWDyE8FtI4MY79E

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks