General

  • Target

    ccad91966b83f69a1500d15f56fcd5d7_JaffaCakes118

  • Size

    544KB

  • Sample

    241206-m97q2svje1

  • MD5

    ccad91966b83f69a1500d15f56fcd5d7

  • SHA1

    f9df4cd23a5e8a3722f4c1e5300bb5f7ee483b65

  • SHA256

    b43bce58b149f4e9c4a615b9e0f389bf99fd47b9ce5f88a93f2f8528375083f4

  • SHA512

    1ec1c0aabbfcaf0acabf5daa41b0036f1589924b8c976acf6c81603c305d1cd46f56f47eeccae0ce72d6e477532cab6cb7109c2da2e208de74f7889987428bd2

  • SSDEEP

    12288:WxXaFQ8LGHE9OH4AstinK3AY9g6CDWRl06cTfrHkfuL:PQYsH4AsvwYFCXHkf

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      ccad91966b83f69a1500d15f56fcd5d7_JaffaCakes118

    • Size

      544KB

    • MD5

      ccad91966b83f69a1500d15f56fcd5d7

    • SHA1

      f9df4cd23a5e8a3722f4c1e5300bb5f7ee483b65

    • SHA256

      b43bce58b149f4e9c4a615b9e0f389bf99fd47b9ce5f88a93f2f8528375083f4

    • SHA512

      1ec1c0aabbfcaf0acabf5daa41b0036f1589924b8c976acf6c81603c305d1cd46f56f47eeccae0ce72d6e477532cab6cb7109c2da2e208de74f7889987428bd2

    • SSDEEP

      12288:WxXaFQ8LGHE9OH4AstinK3AY9g6CDWRl06cTfrHkfuL:PQYsH4AsvwYFCXHkf

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks