General

  • Target

    b304a8e34b775af3b6dd13bf3a69d125_JaffaCakes118

  • Size

    132KB

  • Sample

    241129-wx49tszmdy

  • MD5

    b304a8e34b775af3b6dd13bf3a69d125

  • SHA1

    2739c914589020d6a4dc5509339e521ffe5a1fe6

  • SHA256

    12eae1f259a2309cc8014f6cb951b1dc2bf76ec01db79383404b71991ef5d359

  • SHA512

    807bdadbd655db1a9818c1ee3b4dccd6f9a94c70b12d6d8a19cd0f254f5038a0e979a3f6be83512cb396308c56f3380919e892595e03445e593f834bd14043e8

  • SSDEEP

    3072:03tIZhoNMgbkFxuQsfetBoC5YDkGXFW/:KMgCucjoCiQGX4

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      b304a8e34b775af3b6dd13bf3a69d125_JaffaCakes118

    • Size

      132KB

    • MD5

      b304a8e34b775af3b6dd13bf3a69d125

    • SHA1

      2739c914589020d6a4dc5509339e521ffe5a1fe6

    • SHA256

      12eae1f259a2309cc8014f6cb951b1dc2bf76ec01db79383404b71991ef5d359

    • SHA512

      807bdadbd655db1a9818c1ee3b4dccd6f9a94c70b12d6d8a19cd0f254f5038a0e979a3f6be83512cb396308c56f3380919e892595e03445e593f834bd14043e8

    • SSDEEP

      3072:03tIZhoNMgbkFxuQsfetBoC5YDkGXFW/:KMgCucjoCiQGX4

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks