General

  • Target

    cde18a961db903ddf473e22bc856b626_JaffaCakes118

  • Size

    137KB

  • Sample

    241206-tjgkhavrev

  • MD5

    cde18a961db903ddf473e22bc856b626

  • SHA1

    73e1bcb550453ce92e009076e9e5a5b6078f1761

  • SHA256

    dc2d3a37a9df088602faaa2cd6e13b76bfdde97c547a7b1de96c3e5a2df25932

  • SHA512

    3ad70a1b395ad3700b347ad7a537c40f334b74e9c6b7ef7e963bca029a0d16faa82cfa055b612eb0c164ed9a79a25dba217ce91ae91870f7609f7e31396f1e3c

  • SSDEEP

    3072:acdoULbBzcf8p80JRtJkhPib7q3MS+6RdAHD:bo6ycJjoM7hS+6RiHD

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      cde18a961db903ddf473e22bc856b626_JaffaCakes118

    • Size

      137KB

    • MD5

      cde18a961db903ddf473e22bc856b626

    • SHA1

      73e1bcb550453ce92e009076e9e5a5b6078f1761

    • SHA256

      dc2d3a37a9df088602faaa2cd6e13b76bfdde97c547a7b1de96c3e5a2df25932

    • SHA512

      3ad70a1b395ad3700b347ad7a537c40f334b74e9c6b7ef7e963bca029a0d16faa82cfa055b612eb0c164ed9a79a25dba217ce91ae91870f7609f7e31396f1e3c

    • SSDEEP

      3072:acdoULbBzcf8p80JRtJkhPib7q3MS+6RdAHD:bo6ycJjoM7hS+6RiHD

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks