General

  • Target

    d41b351bddac402fe3ed324a97a6e3f7_JaffaCakes118

  • Size

    711KB

  • Sample

    241207-29knvazjbt

  • MD5

    d41b351bddac402fe3ed324a97a6e3f7

  • SHA1

    69ec25847b08cd26f9513d0ecf0896eec447900e

  • SHA256

    063e906f774943f2321e8f00ebfd56db6c2aac7cb7300ce32b171049656f8998

  • SHA512

    70df62d8c02d9c342917761d61f9468a950f62205282074854c0544b1cb57bb43051b55aa8bd77c3ab72ac60a8deb4425da4e202b06f31398c6386fff32bb413

  • SSDEEP

    12288:wygsDEgpAAx6Eu5P5sZB04VEPNwlo/Cs4Dbazkn41GmJ73pQgTecVo8dVSg115Ru:KsDEgpUFP5QSPNwlo/8nazS41rl39ecT

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      d41b351bddac402fe3ed324a97a6e3f7_JaffaCakes118

    • Size

      711KB

    • MD5

      d41b351bddac402fe3ed324a97a6e3f7

    • SHA1

      69ec25847b08cd26f9513d0ecf0896eec447900e

    • SHA256

      063e906f774943f2321e8f00ebfd56db6c2aac7cb7300ce32b171049656f8998

    • SHA512

      70df62d8c02d9c342917761d61f9468a950f62205282074854c0544b1cb57bb43051b55aa8bd77c3ab72ac60a8deb4425da4e202b06f31398c6386fff32bb413

    • SSDEEP

      12288:wygsDEgpAAx6Eu5P5sZB04VEPNwlo/Cs4Dbazkn41GmJ73pQgTecVo8dVSg115Ru:KsDEgpUFP5QSPNwlo/8nazS41rl39ecT

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Drops file in Drivers directory

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

MITRE ATT&CK Enterprise v15

Tasks