General

  • Target

    ba989968b0b612fcd5be4f13420e90d7_JaffaCakes118

  • Size

    174KB

  • Sample

    241202-2zae5axlgs

  • MD5

    ba989968b0b612fcd5be4f13420e90d7

  • SHA1

    8eb5d17ac4a6930464426fc48a2c18c11150bbd5

  • SHA256

    25852638935167770734c0ffd7577d03fda9f5f9d45155153f31abf2c5300ff0

  • SHA512

    d884ff5ace0d8974f2240b3a0c7da1062d482932a96232e4301d4ab43ebd27b303981727ac0af567166f39b54b125bce237005892ad00b82eeceefd9e75a7a58

  • SSDEEP

    3072:q6UHMux55clgTn/iHmKtzld4as4MhX7VCLpsM7dRrveuJwWRTw:BucgL/m4aHuXQh7LeuvRk

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      ba989968b0b612fcd5be4f13420e90d7_JaffaCakes118

    • Size

      174KB

    • MD5

      ba989968b0b612fcd5be4f13420e90d7

    • SHA1

      8eb5d17ac4a6930464426fc48a2c18c11150bbd5

    • SHA256

      25852638935167770734c0ffd7577d03fda9f5f9d45155153f31abf2c5300ff0

    • SHA512

      d884ff5ace0d8974f2240b3a0c7da1062d482932a96232e4301d4ab43ebd27b303981727ac0af567166f39b54b125bce237005892ad00b82eeceefd9e75a7a58

    • SSDEEP

      3072:q6UHMux55clgTn/iHmKtzld4as4MhX7VCLpsM7dRrveuJwWRTw:BucgL/m4aHuXQh7LeuvRk

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks