General

  • Target

    c26d53699dc7dbfdc640fb675afa54f1_JaffaCakes118

  • Size

    473KB

  • Sample

    241204-n45j6svlbt

  • MD5

    c26d53699dc7dbfdc640fb675afa54f1

  • SHA1

    1a1383addff6a6010539df71491a4ac7ab6e68ff

  • SHA256

    a8302286de7c10c6f37c0a975f765bbe791a455f4ddcd0136ae192ab3b5406fa

  • SHA512

    325cb7adc3d4df1aaea3e3f69cdc74e180c14bf530c3d1faa810516c3054faa280d358604d546854677dca266f9cf3211d3f02b58f843174cec251c4ff11f2bd

  • SSDEEP

    6144:IFeLlS5FZCABeVkGrMO3N9hF4fe6ByMnk/I6pSDy4N5q39dVdnNn1u9/TPr5P6uQ:CD6AYhMarNu1nVYeE8RhpQetCz

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      c26d53699dc7dbfdc640fb675afa54f1_JaffaCakes118

    • Size

      473KB

    • MD5

      c26d53699dc7dbfdc640fb675afa54f1

    • SHA1

      1a1383addff6a6010539df71491a4ac7ab6e68ff

    • SHA256

      a8302286de7c10c6f37c0a975f765bbe791a455f4ddcd0136ae192ab3b5406fa

    • SHA512

      325cb7adc3d4df1aaea3e3f69cdc74e180c14bf530c3d1faa810516c3054faa280d358604d546854677dca266f9cf3211d3f02b58f843174cec251c4ff11f2bd

    • SSDEEP

      6144:IFeLlS5FZCABeVkGrMO3N9hF4fe6ByMnk/I6pSDy4N5q39dVdnNn1u9/TPr5P6uQ:CD6AYhMarNu1nVYeE8RhpQetCz

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks