General

  • Target

    e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118

  • Size

    143KB

  • Sample

    241211-rmb33szqgm

  • MD5

    e1d83034bbf6a31c35bbcee0ecd0b491

  • SHA1

    46b3b9f1ac677ba0daa2a7305fa7307c59cf985e

  • SHA256

    d50d551612f0d81c35677a0f2fe2ab16f78c5f2842948011d2b9bc387127b83c

  • SHA512

    f5860771564d2836af6250be4087fbd27f25506ed15871829c18dcb5021e990e4d59e8c99a3256e40e3e24a019d8d0e048a79d80edd511ad55bad9130b745141

  • SSDEEP

    1536:3wwpWESzX4dia8O99dSuwrCq7StPoPAWgUIYFMSiU7a4+dwvEsyGpaDVGcc3s/b:gfBr4ogHIzuYFnB7a4+a8syGp7V3sT

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118

    • Size

      143KB

    • MD5

      e1d83034bbf6a31c35bbcee0ecd0b491

    • SHA1

      46b3b9f1ac677ba0daa2a7305fa7307c59cf985e

    • SHA256

      d50d551612f0d81c35677a0f2fe2ab16f78c5f2842948011d2b9bc387127b83c

    • SHA512

      f5860771564d2836af6250be4087fbd27f25506ed15871829c18dcb5021e990e4d59e8c99a3256e40e3e24a019d8d0e048a79d80edd511ad55bad9130b745141

    • SSDEEP

      1536:3wwpWESzX4dia8O99dSuwrCq7StPoPAWgUIYFMSiU7a4+dwvEsyGpaDVGcc3s/b:gfBr4ogHIzuYFnB7a4+a8syGp7V3sT

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Looks for VMWare Tools registry key

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks