General

  • Target

    bd81c9b4e808986568e82f507e8a5b3c_JaffaCakes118

  • Size

    134KB

  • Sample

    241203-p8rpjs1rem

  • MD5

    bd81c9b4e808986568e82f507e8a5b3c

  • SHA1

    139b69fac6cace200cf8bbf0617ebff85bfa295f

  • SHA256

    ebd1e9e477918163f3c7ba846f5de93da3cd32bacbd0405317e3053469870888

  • SHA512

    3cde64c726d11a3c4645ad73ae58a4abc93f0e9ca7730da14ad4b486d69999d91108e861e5accac347eed2fda51d3d8c6f26aed45269be820d16ca52c1c96779

  • SSDEEP

    3072:vv/AGWxl0vhtBNwTYYgioDlwbtVBCN1xRWy1MaiyzUhAv2EdK:X/ApshwaiilwTIN1xRSaJUhi7dK

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      bd81c9b4e808986568e82f507e8a5b3c_JaffaCakes118

    • Size

      134KB

    • MD5

      bd81c9b4e808986568e82f507e8a5b3c

    • SHA1

      139b69fac6cace200cf8bbf0617ebff85bfa295f

    • SHA256

      ebd1e9e477918163f3c7ba846f5de93da3cd32bacbd0405317e3053469870888

    • SHA512

      3cde64c726d11a3c4645ad73ae58a4abc93f0e9ca7730da14ad4b486d69999d91108e861e5accac347eed2fda51d3d8c6f26aed45269be820d16ca52c1c96779

    • SSDEEP

      3072:vv/AGWxl0vhtBNwTYYgioDlwbtVBCN1xRWy1MaiyzUhAv2EdK:X/ApshwaiilwTIN1xRSaJUhi7dK

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Modifies firewall policy service

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks