General

  • Target

    f121bdda0e29e4b18aa1865c25abaaed_JaffaCakes118

  • Size

    84KB

  • Sample

    241214-22gbfsynej

  • MD5

    f121bdda0e29e4b18aa1865c25abaaed

  • SHA1

    4efa5b6f122641a0ba97ff17e0e0dae5fa15b308

  • SHA256

    d86929b6c61ac29452b8b3028a1b80cfaf46e64072c2ae4aa641322781c661d5

  • SHA512

    bc99d0a0bfb9e2a0d0a52eb8f6abce7c9329dea9c350eb337c882e9b3d57540cad86b5274e6592db6b90ef759fb1a22d8d00169b891ffe31449b13dbc0bdf7ab

  • SSDEEP

    768:/8rOiefXTMwAOfzjktwKD03y7XktU3+B35JoMh5vorG4wKEjJzc1qZl0sSK:/jJfLzzJKDiyEUQ3NvoC+8c1Sv

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      f121bdda0e29e4b18aa1865c25abaaed_JaffaCakes118

    • Size

      84KB

    • MD5

      f121bdda0e29e4b18aa1865c25abaaed

    • SHA1

      4efa5b6f122641a0ba97ff17e0e0dae5fa15b308

    • SHA256

      d86929b6c61ac29452b8b3028a1b80cfaf46e64072c2ae4aa641322781c661d5

    • SHA512

      bc99d0a0bfb9e2a0d0a52eb8f6abce7c9329dea9c350eb337c882e9b3d57540cad86b5274e6592db6b90ef759fb1a22d8d00169b891ffe31449b13dbc0bdf7ab

    • SSDEEP

      768:/8rOiefXTMwAOfzjktwKD03y7XktU3+B35JoMh5vorG4wKEjJzc1qZl0sSK:/jJfLzzJKDiyEUQ3NvoC+8c1Sv

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks