General

  • Target

    e7549ec8fa1ba0ba769e8cfe14d34790_JaffaCakes118

  • Size

    142KB

  • Sample

    241212-t95d9aslhj

  • MD5

    e7549ec8fa1ba0ba769e8cfe14d34790

  • SHA1

    8e1130a36a9f26256fd2e0e6be67d5bc980aee66

  • SHA256

    d0215d9f04581b0d6329d70ee1d501d2fa2360a9f274da0a22eca611fb882ad1

  • SHA512

    31021a284312716323579b4de6dc27c76c9c55bdb620b490c1a1defe5360684b864ee5a65f1d299df6af2ba45005072e695b745a7896625738743a92caa7cd28

  • SSDEEP

    3072:NT0/l0C5cSH6fMUAxeIE3EyMd8Z6OpA/RCpMxil+xI:NBCuRfMQFMd7gAgp0iMxI

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      e7549ec8fa1ba0ba769e8cfe14d34790_JaffaCakes118

    • Size

      142KB

    • MD5

      e7549ec8fa1ba0ba769e8cfe14d34790

    • SHA1

      8e1130a36a9f26256fd2e0e6be67d5bc980aee66

    • SHA256

      d0215d9f04581b0d6329d70ee1d501d2fa2360a9f274da0a22eca611fb882ad1

    • SHA512

      31021a284312716323579b4de6dc27c76c9c55bdb620b490c1a1defe5360684b864ee5a65f1d299df6af2ba45005072e695b745a7896625738743a92caa7cd28

    • SSDEEP

      3072:NT0/l0C5cSH6fMUAxeIE3EyMd8Z6OpA/RCpMxil+xI:NBCuRfMQFMd7gAgp0iMxI

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks