General

  • Target

    d7d11b49bf59d1b0729f371ea099dc9f_JaffaCakes118

  • Size

    312KB

  • Sample

    241208-s7ha9ssqar

  • MD5

    d7d11b49bf59d1b0729f371ea099dc9f

  • SHA1

    0c79c2e672e942f09008cd9e8cc008fa105f7525

  • SHA256

    9b52078c49b89a3005893b903f86e6cbe56858ac48d6ff4da88df4ca564eb369

  • SHA512

    48a2db43ae5a2ee78d8eb305dcbfc179047a2023bf8318974f1ea072461ff657041d734a505a45ec822ec7eb5c25f2b0f1ba7e4c06403cffbc93b0f8cfbe91ae

  • SSDEEP

    6144:j0Dd6+SD+dYnY9cCxaTVfbtTkyrfX4y2NRxzCOfKKm8V:AM+SD+2n7CxaRbjrfX4yURJm

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      d7d11b49bf59d1b0729f371ea099dc9f_JaffaCakes118

    • Size

      312KB

    • MD5

      d7d11b49bf59d1b0729f371ea099dc9f

    • SHA1

      0c79c2e672e942f09008cd9e8cc008fa105f7525

    • SHA256

      9b52078c49b89a3005893b903f86e6cbe56858ac48d6ff4da88df4ca564eb369

    • SHA512

      48a2db43ae5a2ee78d8eb305dcbfc179047a2023bf8318974f1ea072461ff657041d734a505a45ec822ec7eb5c25f2b0f1ba7e4c06403cffbc93b0f8cfbe91ae

    • SSDEEP

      6144:j0Dd6+SD+dYnY9cCxaTVfbtTkyrfX4y2NRxzCOfKKm8V:AM+SD+2n7CxaRbjrfX4yURJm

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks