General

  • Target

    d2189f7b113bf073b7e9f9a5d793d6bd_JaffaCakes118

  • Size

    168KB

  • Sample

    241207-m1xvgszkew

  • MD5

    d2189f7b113bf073b7e9f9a5d793d6bd

  • SHA1

    2b33a7e571f5290993d10b632d11632e8120546e

  • SHA256

    de15f27ab4de28510fd21208a16587b363d38f54768764e570b9efd037c226b7

  • SHA512

    9e632202707358d8577fe9b99a1c1792ffb82348766b8ff402c789d17b6450b077cf34575e9b8ff93149ce08c58ed1a90ee03d9402daf3d7819375069baec865

  • SSDEEP

    3072:Dq0PYeUvbN1fAJ52e/aC/YW1EEUUYZD/KAkM+AjDxAOokUVuYV5f+ou+fpw:mvTN1f/maC/YW1E3jZLXZZ8VuYCovhw

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      d2189f7b113bf073b7e9f9a5d793d6bd_JaffaCakes118

    • Size

      168KB

    • MD5

      d2189f7b113bf073b7e9f9a5d793d6bd

    • SHA1

      2b33a7e571f5290993d10b632d11632e8120546e

    • SHA256

      de15f27ab4de28510fd21208a16587b363d38f54768764e570b9efd037c226b7

    • SHA512

      9e632202707358d8577fe9b99a1c1792ffb82348766b8ff402c789d17b6450b077cf34575e9b8ff93149ce08c58ed1a90ee03d9402daf3d7819375069baec865

    • SSDEEP

      3072:Dq0PYeUvbN1fAJ52e/aC/YW1EEUUYZD/KAkM+AjDxAOokUVuYV5f+ou+fpw:mvTN1f/maC/YW1E3jZLXZZ8VuYCovhw

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks