General

  • Target

    c08f8d4e6b83474a05e2de1e2ca11769_JaffaCakes118

  • Size

    222KB

  • Sample

    241204-dspdpsvkdm

  • MD5

    c08f8d4e6b83474a05e2de1e2ca11769

  • SHA1

    5e04db1bfee9af6d4dbf510cb0eb9ce302b93e32

  • SHA256

    e7f1e5627aeaed7d0badf27e0c5c40f4d505e7620a4251ab40f9c6d9b3f58a5a

  • SHA512

    aef5b9a1ec5441e741f5ef7b04cf6975845f028a5de69c0265c9eef2c1b836d1eb22b8094779a414e4e4a72bdf5a6369fb240cc066fe71122d2e78ba676936da

  • SSDEEP

    3072:IA8oq1KxZ2pfOutpE1x0liTRhohMRWWnQZDAhAkvr/skjGdOpdaPLAYvru5D6Y7L:f4WZKvk6Woh0jAWTsesS5uT+MOq

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      c08f8d4e6b83474a05e2de1e2ca11769_JaffaCakes118

    • Size

      222KB

    • MD5

      c08f8d4e6b83474a05e2de1e2ca11769

    • SHA1

      5e04db1bfee9af6d4dbf510cb0eb9ce302b93e32

    • SHA256

      e7f1e5627aeaed7d0badf27e0c5c40f4d505e7620a4251ab40f9c6d9b3f58a5a

    • SHA512

      aef5b9a1ec5441e741f5ef7b04cf6975845f028a5de69c0265c9eef2c1b836d1eb22b8094779a414e4e4a72bdf5a6369fb240cc066fe71122d2e78ba676936da

    • SSDEEP

      3072:IA8oq1KxZ2pfOutpE1x0liTRhohMRWWnQZDAhAkvr/skjGdOpdaPLAYvru5D6Y7L:f4WZKvk6Woh0jAWTsesS5uT+MOq

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks