General

  • Target

    ea318452cd64377cd6d3c02e2eb610f6_JaffaCakes118

  • Size

    174KB

  • Sample

    241213-gkzfgssjal

  • MD5

    ea318452cd64377cd6d3c02e2eb610f6

  • SHA1

    20d3eabb215e2c47b8a07a34df140624497d8b58

  • SHA256

    eef6a94efaca420159b9ccfaa63fbd1e0a19e75e113049beee8a61b37005fb7e

  • SHA512

    2372fa6b62f645c59250be7fec78025290168b57ed23015db6242940800587dcd7cb593618e02217a3109949fa05b5bc3ad1bfb3123b7df7e8349d789cdd9cde

  • SSDEEP

    3072:V6sIBFdzCbwci5G9ZzQeo0a9jk5+Azit3zkAXR25lk9Bwzn6LNwN:4zC8izQz0ejo+AzsZXR25lkc6xwN

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      ea318452cd64377cd6d3c02e2eb610f6_JaffaCakes118

    • Size

      174KB

    • MD5

      ea318452cd64377cd6d3c02e2eb610f6

    • SHA1

      20d3eabb215e2c47b8a07a34df140624497d8b58

    • SHA256

      eef6a94efaca420159b9ccfaa63fbd1e0a19e75e113049beee8a61b37005fb7e

    • SHA512

      2372fa6b62f645c59250be7fec78025290168b57ed23015db6242940800587dcd7cb593618e02217a3109949fa05b5bc3ad1bfb3123b7df7e8349d789cdd9cde

    • SSDEEP

      3072:V6sIBFdzCbwci5G9ZzQeo0a9jk5+Azit3zkAXR25lk9Bwzn6LNwN:4zC8izQz0ejo+AzsZXR25lkc6xwN

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks