General

  • Target

    ecb5ea358c7ddbbc75cab797619d0361_JaffaCakes118

  • Size

    171KB

  • Sample

    241213-wlf3vsyjdm

  • MD5

    ecb5ea358c7ddbbc75cab797619d0361

  • SHA1

    8746bbd3160e693526b7062b865c258ee403a7c7

  • SHA256

    76bc749e3c7bc69c5f12cc7763a0cbbf9260bf037e1c31d37b2a615341d46c12

  • SHA512

    fda865648fdc47d4e9bb650fddf6a7879522f1d9b249a290afbd9b97b5195eb6b2e2d592a2dad2740b6b2fe64a7ed816ee74941e50956c4c8e352bd716b29ffb

  • SSDEEP

    3072:KG+OnwL1pgJ8dhApBSLdqZ7CpvPk2mxNQn/womo:ZE1ZhAjVZ7Mvs2YTo

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      ecb5ea358c7ddbbc75cab797619d0361_JaffaCakes118

    • Size

      171KB

    • MD5

      ecb5ea358c7ddbbc75cab797619d0361

    • SHA1

      8746bbd3160e693526b7062b865c258ee403a7c7

    • SHA256

      76bc749e3c7bc69c5f12cc7763a0cbbf9260bf037e1c31d37b2a615341d46c12

    • SHA512

      fda865648fdc47d4e9bb650fddf6a7879522f1d9b249a290afbd9b97b5195eb6b2e2d592a2dad2740b6b2fe64a7ed816ee74941e50956c4c8e352bd716b29ffb

    • SSDEEP

      3072:KG+OnwL1pgJ8dhApBSLdqZ7CpvPk2mxNQn/womo:ZE1ZhAjVZ7Mvs2YTo

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks