General

  • Target

    b9b0866f62ca8e63dfa1c25d8a3d1c0a_JaffaCakes118

  • Size

    284KB

  • Sample

    241202-xmnd1axmdy

  • MD5

    b9b0866f62ca8e63dfa1c25d8a3d1c0a

  • SHA1

    e82c3c9cf73945f5355a4b13e5e0cd1809f029dd

  • SHA256

    5717e8fdbb3584378709d5d3902f5340fc25f305f4d5e72a47585395879b3510

  • SHA512

    1f2f739c9a32749fbb7ac67f8ad15dcb4e8b9f69a63aec92a936ba93636583531bd284eb892b7387897888b6ee5e4849082d3aff964071533283f07bc01040bb

  • SSDEEP

    6144:AVdXhw8TAcCHKg77t139iriX6djwucCTWO:AVdX6DcqPt13Ci1ucUv

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      b9b0866f62ca8e63dfa1c25d8a3d1c0a_JaffaCakes118

    • Size

      284KB

    • MD5

      b9b0866f62ca8e63dfa1c25d8a3d1c0a

    • SHA1

      e82c3c9cf73945f5355a4b13e5e0cd1809f029dd

    • SHA256

      5717e8fdbb3584378709d5d3902f5340fc25f305f4d5e72a47585395879b3510

    • SHA512

      1f2f739c9a32749fbb7ac67f8ad15dcb4e8b9f69a63aec92a936ba93636583531bd284eb892b7387897888b6ee5e4849082d3aff964071533283f07bc01040bb

    • SSDEEP

      6144:AVdXhw8TAcCHKg77t139iriX6djwucCTWO:AVdX6DcqPt13Ci1ucUv

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks