General

  • Target

    d5b5303edd3f1ce1fa3d0c0f9700f793_JaffaCakes118

  • Size

    252KB

  • Sample

    241208-hbnhas1lbm

  • MD5

    d5b5303edd3f1ce1fa3d0c0f9700f793

  • SHA1

    a41127851ae1c6bc59f18ccb63d1df4738cb2b15

  • SHA256

    c045044a934b479d80e7b62b2989b0bc958cb40b3cd077fa748e8b73ba053f46

  • SHA512

    e74e7d6836c8781d62490d67876f5b1b427ac34965f8b53de94fc2326aca1106ddec53deb43d051980743146f79f3e7f0c3182663f5b8365dede59f66f20ba9a

  • SSDEEP

    3072:wx5ublQOtrlQLmA87PZWVjisW68r3oCykqMfZjRXXE0RaDcHxaDcHxaDcNH9pTQi:wxgJ2aA87PQpis8oCykqMbHWA

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      d5b5303edd3f1ce1fa3d0c0f9700f793_JaffaCakes118

    • Size

      252KB

    • MD5

      d5b5303edd3f1ce1fa3d0c0f9700f793

    • SHA1

      a41127851ae1c6bc59f18ccb63d1df4738cb2b15

    • SHA256

      c045044a934b479d80e7b62b2989b0bc958cb40b3cd077fa748e8b73ba053f46

    • SHA512

      e74e7d6836c8781d62490d67876f5b1b427ac34965f8b53de94fc2326aca1106ddec53deb43d051980743146f79f3e7f0c3182663f5b8365dede59f66f20ba9a

    • SSDEEP

      3072:wx5ublQOtrlQLmA87PZWVjisW68r3oCykqMfZjRXXE0RaDcHxaDcHxaDcNH9pTQi:wxgJ2aA87PQpis8oCykqMbHWA

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Modifies firewall policy service

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks