General

  • Target

    df9bd3eca0da66909b314fe5d682220f_JaffaCakes118

  • Size

    210KB

  • Sample

    241211-dcs2ysspgt

  • MD5

    df9bd3eca0da66909b314fe5d682220f

  • SHA1

    5ebd4d7f6cac5e51b87a2212bf5e420d209f78e0

  • SHA256

    e4aabda829135836bce43b9fddbaf733d3dbda6a2e8a9cb5844f95105950e5cf

  • SHA512

    70695f5824e06fed2e59dd07f476dea031e6030de7be0d9c526319d20e2ebae56bf67dca7119bfdf85f4233fa43dfb12c27df810de7fa3ae5ef07f53506aeb0b

  • SSDEEP

    3072:9ZVUyTavMYZZaHSkucAbwsH/Tb2s8iRfQVWnYDAew4xpRW8s1spD/0QL9KOEMtiu:joVZgHSkzQwO7iJQQVWYvvHsGZ/06N

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      df9bd3eca0da66909b314fe5d682220f_JaffaCakes118

    • Size

      210KB

    • MD5

      df9bd3eca0da66909b314fe5d682220f

    • SHA1

      5ebd4d7f6cac5e51b87a2212bf5e420d209f78e0

    • SHA256

      e4aabda829135836bce43b9fddbaf733d3dbda6a2e8a9cb5844f95105950e5cf

    • SHA512

      70695f5824e06fed2e59dd07f476dea031e6030de7be0d9c526319d20e2ebae56bf67dca7119bfdf85f4233fa43dfb12c27df810de7fa3ae5ef07f53506aeb0b

    • SSDEEP

      3072:9ZVUyTavMYZZaHSkucAbwsH/Tb2s8iRfQVWnYDAew4xpRW8s1spD/0QL9KOEMtiu:joVZgHSkzQwO7iJQQVWYvvHsGZ/06N

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks