General

  • Target

    dbb207f2e80c2dfed39597a40539bd9b_JaffaCakes118

  • Size

    140KB

  • Sample

    241209-1nyg5ssnax

  • MD5

    dbb207f2e80c2dfed39597a40539bd9b

  • SHA1

    1409ec7f6a72e167c2353a5800cf1d47eceef7d0

  • SHA256

    c5b4a36ebdb894e55eb1a0ce991ea8e4e72d86d0945977b892831d7d96d358e9

  • SHA512

    a50aa1af17fc47b8fef2100207c20a3ad65e689430b76b8f4646c7021306d7c86d86a24307a999b66f252a954a912addd676375d0d778393e063a5fce77ed310

  • SSDEEP

    3072:sYKGtWxuFs4Hx+vQBPjP6JAhHaD3y6PEEVAkPNJX7fqg1:aG8x67xDBPL6J2HaDbJ71

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      dbb207f2e80c2dfed39597a40539bd9b_JaffaCakes118

    • Size

      140KB

    • MD5

      dbb207f2e80c2dfed39597a40539bd9b

    • SHA1

      1409ec7f6a72e167c2353a5800cf1d47eceef7d0

    • SHA256

      c5b4a36ebdb894e55eb1a0ce991ea8e4e72d86d0945977b892831d7d96d358e9

    • SHA512

      a50aa1af17fc47b8fef2100207c20a3ad65e689430b76b8f4646c7021306d7c86d86a24307a999b66f252a954a912addd676375d0d778393e063a5fce77ed310

    • SSDEEP

      3072:sYKGtWxuFs4Hx+vQBPjP6JAhHaD3y6PEEVAkPNJX7fqg1:aG8x67xDBPL6J2HaDbJ71

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks