General

  • Target

    bc1eab92bebb47e47c704aac84b35e68_JaffaCakes118

  • Size

    1.3MB

  • Sample

    241203-hbychazkem

  • MD5

    bc1eab92bebb47e47c704aac84b35e68

  • SHA1

    3b6009f45154d7e6cd201557a17eb693278d3eaa

  • SHA256

    2a25e14dfbb655c66ca7665e594d545cb05932ac027319d1726385fb5dae0c6c

  • SHA512

    08f9d1d0a177550e8be3628ce39b26fa3210465606dcae6d4c87eff51b17fbd99b348d71a843eed1935e66f97f0c0de9d83b029d069b18c2fef44e44ae1b45f0

  • SSDEEP

    6144:O9UaIuFpuvGr5ojjc6sdV0x9Bwb47nTplvV3D77eraR:zQUC6sdWXBIknTplt3DveraR

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      bc1eab92bebb47e47c704aac84b35e68_JaffaCakes118

    • Size

      1.3MB

    • MD5

      bc1eab92bebb47e47c704aac84b35e68

    • SHA1

      3b6009f45154d7e6cd201557a17eb693278d3eaa

    • SHA256

      2a25e14dfbb655c66ca7665e594d545cb05932ac027319d1726385fb5dae0c6c

    • SHA512

      08f9d1d0a177550e8be3628ce39b26fa3210465606dcae6d4c87eff51b17fbd99b348d71a843eed1935e66f97f0c0de9d83b029d069b18c2fef44e44ae1b45f0

    • SSDEEP

      6144:O9UaIuFpuvGr5ojjc6sdV0x9Bwb47nTplvV3D77eraR:zQUC6sdWXBIknTplt3DveraR

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks