General

  • Target

    ce9eec00eaba6994fb2c3dc411637277_JaffaCakes118

  • Size

    299KB

  • Sample

    241206-x3pxrsypcn

  • MD5

    ce9eec00eaba6994fb2c3dc411637277

  • SHA1

    aad1754c33950ecce068d41fc404591f866bc482

  • SHA256

    c4cc612d6c57c8edc05fed8906ff6d65cd0b37e700370427d1195c16ac1a4f07

  • SHA512

    c66cd7d81cc9b7fcfafd793d89dd937e51b8c818c61cc2b98d617b87ea2bedd55ef2c700f80c64d2e6f9805c6692e73fe76fd1df282e871ea47ff8b34424cdd1

  • SSDEEP

    6144:im7mRE1CW3e0dZfFgCZTdsmnElY0oeo+u/gLSHAEtBycRAl:peED1dTdxGmnOY0oeolYLSHAgByMAl

Malware Config

Extracted

Family

metasploit

Version

encoder/fnstenv_mov

Targets

    • Target

      ce9eec00eaba6994fb2c3dc411637277_JaffaCakes118

    • Size

      299KB

    • MD5

      ce9eec00eaba6994fb2c3dc411637277

    • SHA1

      aad1754c33950ecce068d41fc404591f866bc482

    • SHA256

      c4cc612d6c57c8edc05fed8906ff6d65cd0b37e700370427d1195c16ac1a4f07

    • SHA512

      c66cd7d81cc9b7fcfafd793d89dd937e51b8c818c61cc2b98d617b87ea2bedd55ef2c700f80c64d2e6f9805c6692e73fe76fd1df282e871ea47ff8b34424cdd1

    • SSDEEP

      6144:im7mRE1CW3e0dZfFgCZTdsmnElY0oeo+u/gLSHAEtBycRAl:peED1dTdxGmnOY0oeolYLSHAgByMAl

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Looks for VMWare Tools registry key

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks