General

  • Target

    d502b0c5801ad694f64413e91d0c7a9e_JaffaCakes118

  • Size

    208KB

  • Sample

    241208-dxfx5azmhz

  • MD5

    d502b0c5801ad694f64413e91d0c7a9e

  • SHA1

    e13729b19e5f788c204102f3b913da546a8733e7

  • SHA256

    522db5c7be232d1e4593563ac9b6bb7ec1b2decf96c2b25c3d4447e3689b911c

  • SHA512

    3cd99837ccba99023506c13c004ee7094ba3ab6903f100b045226ee34e7a124464f1338bd81c5513062aa0273b2cf803f4d2f87a52447e4049c4dbe57cd2ffd2

  • SSDEEP

    6144:waIj7DihYYYYYYYYYYYY++YlPwNmEYYYYYYYYYYYYYYYYYYA9d2/pZer93yH6mdt:waW2qrMH5

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      d502b0c5801ad694f64413e91d0c7a9e_JaffaCakes118

    • Size

      208KB

    • MD5

      d502b0c5801ad694f64413e91d0c7a9e

    • SHA1

      e13729b19e5f788c204102f3b913da546a8733e7

    • SHA256

      522db5c7be232d1e4593563ac9b6bb7ec1b2decf96c2b25c3d4447e3689b911c

    • SHA512

      3cd99837ccba99023506c13c004ee7094ba3ab6903f100b045226ee34e7a124464f1338bd81c5513062aa0273b2cf803f4d2f87a52447e4049c4dbe57cd2ffd2

    • SSDEEP

      6144:waIj7DihYYYYYYYYYYYY++YlPwNmEYYYYYYYYYYYYYYYYYYA9d2/pZer93yH6mdt:waW2qrMH5

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks