General

  • Target

    b3e15052cc10186807e8a967341ac8f5_JaffaCakes118

  • Size

    88KB

  • Sample

    241129-2m8gdsvlap

  • MD5

    b3e15052cc10186807e8a967341ac8f5

  • SHA1

    4d1220a77e74e5eaa6915c8d349fbdf6c2a3bf44

  • SHA256

    b4eb57b334171547f4086a92c0f2283921db6814e47390992d028cdf4fd1001c

  • SHA512

    53d7650eeccfb205b6ad60600f36334f5a16bab6581a11bcb81ea202a4dc92cbde05a7b70424f10401ea0cc0636d0e4a57ff626d9431754f737c61d180111a0a

  • SSDEEP

    1536:K+iFaEtB4Y//aXoo7YMMHYKXrX7QTW3j/VFVi/MV2OJMfdT:K+iFaEtiY/iXooMMMRXb7CW3j/j4eAT

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      b3e15052cc10186807e8a967341ac8f5_JaffaCakes118

    • Size

      88KB

    • MD5

      b3e15052cc10186807e8a967341ac8f5

    • SHA1

      4d1220a77e74e5eaa6915c8d349fbdf6c2a3bf44

    • SHA256

      b4eb57b334171547f4086a92c0f2283921db6814e47390992d028cdf4fd1001c

    • SHA512

      53d7650eeccfb205b6ad60600f36334f5a16bab6581a11bcb81ea202a4dc92cbde05a7b70424f10401ea0cc0636d0e4a57ff626d9431754f737c61d180111a0a

    • SSDEEP

      1536:K+iFaEtB4Y//aXoo7YMMHYKXrX7QTW3j/VFVi/MV2OJMfdT:K+iFaEtiY/iXooMMMRXb7CW3j/j4eAT

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks