General

  • Target

    e4c093a7831ada9478504e4fa58e32ae_JaffaCakes118

  • Size

    66KB

  • Sample

    241212-fd47qa1mey

  • MD5

    e4c093a7831ada9478504e4fa58e32ae

  • SHA1

    cb8163b70c9c77fe08e983318ff9a71e57bf6d7d

  • SHA256

    f496f9778c5e5594313e74afa1f97e4a645201c8bcca12ae671e4e5e6c188244

  • SHA512

    aaa432bc07d38e18ac97ac984b55ed82643d1a1f70a572020f9511fcac3132f5cb9e1477dd7ba0a6b1362f0086b51fe2aaf15f6c7af18ea598d7b7acb782f4b1

  • SSDEEP

    1536:/Cev+DwFo8g8F5RQ5llxtyCIrc+px4REuUg4rVvio:rvAso855R2LCZmEuUX1io

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      e4c093a7831ada9478504e4fa58e32ae_JaffaCakes118

    • Size

      66KB

    • MD5

      e4c093a7831ada9478504e4fa58e32ae

    • SHA1

      cb8163b70c9c77fe08e983318ff9a71e57bf6d7d

    • SHA256

      f496f9778c5e5594313e74afa1f97e4a645201c8bcca12ae671e4e5e6c188244

    • SHA512

      aaa432bc07d38e18ac97ac984b55ed82643d1a1f70a572020f9511fcac3132f5cb9e1477dd7ba0a6b1362f0086b51fe2aaf15f6c7af18ea598d7b7acb782f4b1

    • SSDEEP

      1536:/Cev+DwFo8g8F5RQ5llxtyCIrc+px4REuUg4rVvio:rvAso855R2LCZmEuUX1io

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks