General

  • Target

    bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118

  • Size

    149KB

  • Sample

    241204-al3e7s1re1

  • MD5

    bfed004f981bc216bdd584e9202c8b6e

  • SHA1

    d241adfba8f01e1326bfc1dda33da842bba4636c

  • SHA256

    6da9079d6bcc6e40fceb8513b32235b2ff6b462a32739c02fbe7844665cff1f5

  • SHA512

    f71fc3517e0af8619350a8479a77334a1d849e9ad4e3eb41765e15394d78280f54de9f6e6be629cf7a620fb03275837faf17925890a8a62f87db074e60efd05b

  • SSDEEP

    3072:ZbDCt2UkNPQq4JkYzTjTkgxVaIEvw882gR3RrJ04EhoQBs:1/U+PskMCIEvbYB+4EeQBs

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118

    • Size

      149KB

    • MD5

      bfed004f981bc216bdd584e9202c8b6e

    • SHA1

      d241adfba8f01e1326bfc1dda33da842bba4636c

    • SHA256

      6da9079d6bcc6e40fceb8513b32235b2ff6b462a32739c02fbe7844665cff1f5

    • SHA512

      f71fc3517e0af8619350a8479a77334a1d849e9ad4e3eb41765e15394d78280f54de9f6e6be629cf7a620fb03275837faf17925890a8a62f87db074e60efd05b

    • SSDEEP

      3072:ZbDCt2UkNPQq4JkYzTjTkgxVaIEvw882gR3RrJ04EhoQBs:1/U+PskMCIEvbYB+4EeQBs

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks