General

  • Target

    de44c57d1250801ba11dd8e99f9e4f03_JaffaCakes118

  • Size

    284KB

  • Sample

    241210-xy78jsvmcv

  • MD5

    de44c57d1250801ba11dd8e99f9e4f03

  • SHA1

    e33a1a4f3e7c6975ff349ef81fcbf642d2586616

  • SHA256

    c0cc8f045de288c4c5e92c0276fdd0ae98eb91bbe6185c8ab2f3f94cf1d731e8

  • SHA512

    f69fce485e025aa707c2e6681df3931917ee5aba376f73db9d9aec7e147770cb8ae12adeeaf0b65592956e711566fbdda80ed3da8290fab144a2f6a531d5e665

  • SSDEEP

    3072:Z1VMYoCc7mydRtMjVfw5uXtB2yfScsvxFTNSoZ7EuoCc7mydRtMjVfw5uXtB2yfY:yNRtMjVf+affzc4ZNRtMjVf+affzc4Q

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      de44c57d1250801ba11dd8e99f9e4f03_JaffaCakes118

    • Size

      284KB

    • MD5

      de44c57d1250801ba11dd8e99f9e4f03

    • SHA1

      e33a1a4f3e7c6975ff349ef81fcbf642d2586616

    • SHA256

      c0cc8f045de288c4c5e92c0276fdd0ae98eb91bbe6185c8ab2f3f94cf1d731e8

    • SHA512

      f69fce485e025aa707c2e6681df3931917ee5aba376f73db9d9aec7e147770cb8ae12adeeaf0b65592956e711566fbdda80ed3da8290fab144a2f6a531d5e665

    • SSDEEP

      3072:Z1VMYoCc7mydRtMjVfw5uXtB2yfScsvxFTNSoZ7EuoCc7mydRtMjVfw5uXtB2yfY:yNRtMjVf+affzc4ZNRtMjVf+affzc4Q

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks