General

  • Target

    dae49c78b1aae3697fc7bbe56c10608e_JaffaCakes118

  • Size

    195KB

  • Sample

    241209-wt8g3s1ncq

  • MD5

    dae49c78b1aae3697fc7bbe56c10608e

  • SHA1

    adeffe2028d175e81ae049b27ad5b969eaa78a13

  • SHA256

    2826bfe269db279cfdd4f29dbc5525ce3b5ce95dd0f50e89a46cc6223e2efdd7

  • SHA512

    08ffaaee84601da5c2d8dc080fdeea081b2385c83fcdcf410febac1a68222793b72005ea8ca3a3ca89b635fcae7a82d9469205a551b3306457e730a2946b251c

  • SSDEEP

    3072:o2l12n3IaVLO5+JTPXkMHW45fdCBpb5aQvkHy3U6tsZYQfaxYPHte1tgL:mIaVCAFW8lU0QsydeJHl

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      dae49c78b1aae3697fc7bbe56c10608e_JaffaCakes118

    • Size

      195KB

    • MD5

      dae49c78b1aae3697fc7bbe56c10608e

    • SHA1

      adeffe2028d175e81ae049b27ad5b969eaa78a13

    • SHA256

      2826bfe269db279cfdd4f29dbc5525ce3b5ce95dd0f50e89a46cc6223e2efdd7

    • SHA512

      08ffaaee84601da5c2d8dc080fdeea081b2385c83fcdcf410febac1a68222793b72005ea8ca3a3ca89b635fcae7a82d9469205a551b3306457e730a2946b251c

    • SSDEEP

      3072:o2l12n3IaVLO5+JTPXkMHW45fdCBpb5aQvkHy3U6tsZYQfaxYPHte1tgL:mIaVCAFW8lU0QsydeJHl

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks