General

  • Target

    ecdfe6f3b30a3a6884b8ed56784f539a_JaffaCakes118

  • Size

    195KB

  • Sample

    241213-1qccpayrcx

  • MD5

    ecdfe6f3b30a3a6884b8ed56784f539a

  • SHA1

    30a0417c62844abf2ba1f6831f0e401e233cb43c

  • SHA256

    351278495f43eeb2c84f28d969a4f633b17fc07a829f89dd5268a66c210df62c

  • SHA512

    0269475247b81149712b28e0bc073879c26985bcef58eb0f225f9a0b5e780d59fda809ac62d748d1b4d6e681f9c0aca9cde0c2e4ac8251e8a1f16353de13dc35

  • SSDEEP

    3072:Z2t9v1vvdaN5R5+E66WVKnJ1oDgF18/ZYBvJw5WwfhuBdyxXMezdurY/f3O4CUqw:cvVaNHFxWV217tvbwfsB2XMEMrAjqw

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      ecdfe6f3b30a3a6884b8ed56784f539a_JaffaCakes118

    • Size

      195KB

    • MD5

      ecdfe6f3b30a3a6884b8ed56784f539a

    • SHA1

      30a0417c62844abf2ba1f6831f0e401e233cb43c

    • SHA256

      351278495f43eeb2c84f28d969a4f633b17fc07a829f89dd5268a66c210df62c

    • SHA512

      0269475247b81149712b28e0bc073879c26985bcef58eb0f225f9a0b5e780d59fda809ac62d748d1b4d6e681f9c0aca9cde0c2e4ac8251e8a1f16353de13dc35

    • SSDEEP

      3072:Z2t9v1vvdaN5R5+E66WVKnJ1oDgF18/ZYBvJw5WwfhuBdyxXMezdurY/f3O4CUqw:cvVaNHFxWV217tvbwfsB2XMEMrAjqw

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks