General

  • Target

    b6f4f06b306d2ec8bb84f4312b3ead20_JaffaCakes118

  • Size

    291KB

  • Sample

    241202-ftgrcs1mas

  • MD5

    b6f4f06b306d2ec8bb84f4312b3ead20

  • SHA1

    9e3a7d1cdc6e4ca3e3f77b4e600c40cd751b2491

  • SHA256

    01ab469cbc136b144f0f4f747af356de3270c794e9ab63e49b1b4ab908e9e079

  • SHA512

    8b62dfa5b6ac38a3ff88fe4c08f8c1ab63a3df027c8ddbc2984ccacadb800fdedd52b087f6da4abc0c3d00618e457ba9c832dc9414866dfdf5f2a71b835433c1

  • SSDEEP

    6144:00NJ7p6GME0ifks0TsCfYOiOr4TRRPgKJM5QabWHxD+kRdvqM:FJF6Gx0NqOrGoJQQWwkh

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      b6f4f06b306d2ec8bb84f4312b3ead20_JaffaCakes118

    • Size

      291KB

    • MD5

      b6f4f06b306d2ec8bb84f4312b3ead20

    • SHA1

      9e3a7d1cdc6e4ca3e3f77b4e600c40cd751b2491

    • SHA256

      01ab469cbc136b144f0f4f747af356de3270c794e9ab63e49b1b4ab908e9e079

    • SHA512

      8b62dfa5b6ac38a3ff88fe4c08f8c1ab63a3df027c8ddbc2984ccacadb800fdedd52b087f6da4abc0c3d00618e457ba9c832dc9414866dfdf5f2a71b835433c1

    • SSDEEP

      6144:00NJ7p6GME0ifks0TsCfYOiOr4TRRPgKJM5QabWHxD+kRdvqM:FJF6Gx0NqOrGoJQQWwkh

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks