General

  • Target

    d4ab9e5ab0c1e3eff62cde90548e2469_JaffaCakes118

  • Size

    198KB

  • Sample

    241208-b83j6a1mdj

  • MD5

    d4ab9e5ab0c1e3eff62cde90548e2469

  • SHA1

    1dfccdc75d1a0c1c1cf60c3f3ad458c095cd9a7c

  • SHA256

    bcfc049134327a59bc1d6094b82d4cbcdd296c12a90fddedfc498635e50fbfd7

  • SHA512

    d2aa3f6170338eeaec70a08217bc0e969c8f2e426df4643173011135dec9f1620f44ef54f8eb6dc5f90f841c196a8eb06095656a62250dcca5114f70d4b27984

  • SSDEEP

    6144:2CsCl8gSRO0V3qL4cntE2sdTOb7BUhUc+JM4:Js/rIi8iVoJ

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      d4ab9e5ab0c1e3eff62cde90548e2469_JaffaCakes118

    • Size

      198KB

    • MD5

      d4ab9e5ab0c1e3eff62cde90548e2469

    • SHA1

      1dfccdc75d1a0c1c1cf60c3f3ad458c095cd9a7c

    • SHA256

      bcfc049134327a59bc1d6094b82d4cbcdd296c12a90fddedfc498635e50fbfd7

    • SHA512

      d2aa3f6170338eeaec70a08217bc0e969c8f2e426df4643173011135dec9f1620f44ef54f8eb6dc5f90f841c196a8eb06095656a62250dcca5114f70d4b27984

    • SSDEEP

      6144:2CsCl8gSRO0V3qL4cntE2sdTOb7BUhUc+JM4:Js/rIi8iVoJ

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks