General

  • Target

    e227b84110e0ad6cc24400f5a12b2c00_JaffaCakes118

  • Size

    42KB

  • Sample

    241211-s6v6qstlcl

  • MD5

    e227b84110e0ad6cc24400f5a12b2c00

  • SHA1

    5c3fe2013525cd21110fcf74f43d750037c88442

  • SHA256

    df1ea25bc304077fc26d2f3483d9b9ed4e23ece55304ab7832db4c712afad823

  • SHA512

    5ff244bef37d34637fa956e26d73ae7f806e62216670796f2f05460725ae37e212f63a182f5586db66efea6b114c5e6c812411e38bf395c070360c5043ed7441

  • SSDEEP

    768:UuCkdC2D5z4oWV0OCAB4Rld8Inv47MelMkEQNnDZ:Ujkdjl8WK4RP84vkHMeDZ

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      e227b84110e0ad6cc24400f5a12b2c00_JaffaCakes118

    • Size

      42KB

    • MD5

      e227b84110e0ad6cc24400f5a12b2c00

    • SHA1

      5c3fe2013525cd21110fcf74f43d750037c88442

    • SHA256

      df1ea25bc304077fc26d2f3483d9b9ed4e23ece55304ab7832db4c712afad823

    • SHA512

      5ff244bef37d34637fa956e26d73ae7f806e62216670796f2f05460725ae37e212f63a182f5586db66efea6b114c5e6c812411e38bf395c070360c5043ed7441

    • SSDEEP

      768:UuCkdC2D5z4oWV0OCAB4Rld8Inv47MelMkEQNnDZ:Ujkdjl8WK4RP84vkHMeDZ

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks