General

  • Target

    ca475f35ea24f602e07f1e0189a1fb78_JaffaCakes118

  • Size

    192KB

  • Sample

    241206-bfr8qa1rcy

  • MD5

    ca475f35ea24f602e07f1e0189a1fb78

  • SHA1

    8b1327c654445499b0ba67cdbbff92a3d5bd7aa8

  • SHA256

    e2db59bb7c66fa6517eed72d1d923915ff75017ad347825231e2b807887bd51f

  • SHA512

    5bd6f660926698786aa26406b8133e783b43ba5c8b278da5d0d65e1d176a6853aa787df95e97b940b0ffbf0a8868af7566bb77a39238aaf55a7e2da0421be112

  • SSDEEP

    6144:+kFd4T4zNunL696aU84XFQMi6d+puACZ:+GdNzgnuwarLMjd3

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      ca475f35ea24f602e07f1e0189a1fb78_JaffaCakes118

    • Size

      192KB

    • MD5

      ca475f35ea24f602e07f1e0189a1fb78

    • SHA1

      8b1327c654445499b0ba67cdbbff92a3d5bd7aa8

    • SHA256

      e2db59bb7c66fa6517eed72d1d923915ff75017ad347825231e2b807887bd51f

    • SHA512

      5bd6f660926698786aa26406b8133e783b43ba5c8b278da5d0d65e1d176a6853aa787df95e97b940b0ffbf0a8868af7566bb77a39238aaf55a7e2da0421be112

    • SSDEEP

      6144:+kFd4T4zNunL696aU84XFQMi6d+puACZ:+GdNzgnuwarLMjd3

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks