General

  • Target

    ae0fd5c3d36d0cfe612115d131f03b99_JaffaCakes118

  • Size

    226KB

  • Sample

    241129-ayv7naskgm

  • MD5

    ae0fd5c3d36d0cfe612115d131f03b99

  • SHA1

    18171ff53a1ca2730d5ed5372ebb04d487d6993e

  • SHA256

    7acb2831a29b4a02675f87a331e929731ab0a10874c651c744224d8846a9c61d

  • SHA512

    98c875e911632541802187bc85a76c8d8b93ca20d82098eee6e45a2e0bbe5347bc7bcb0e571f8da9c64128c9a0b27217eb780ff485cd5c1f4942e21973faefc2

  • SSDEEP

    6144:wnLYIPeKZF0FO5/9oyOMXGPFQNXj//uoj:wn8oZF0c9PXGtQlj/Lj

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      ae0fd5c3d36d0cfe612115d131f03b99_JaffaCakes118

    • Size

      226KB

    • MD5

      ae0fd5c3d36d0cfe612115d131f03b99

    • SHA1

      18171ff53a1ca2730d5ed5372ebb04d487d6993e

    • SHA256

      7acb2831a29b4a02675f87a331e929731ab0a10874c651c744224d8846a9c61d

    • SHA512

      98c875e911632541802187bc85a76c8d8b93ca20d82098eee6e45a2e0bbe5347bc7bcb0e571f8da9c64128c9a0b27217eb780ff485cd5c1f4942e21973faefc2

    • SSDEEP

      6144:wnLYIPeKZF0FO5/9oyOMXGPFQNXj//uoj:wn8oZF0c9PXGtQlj/Lj

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks