General

  • Target

    f73702d091e7640535dda117507da6be_JaffaCakes118

  • Size

    88KB

  • Sample

    241216-en8r8atkbs

  • MD5

    f73702d091e7640535dda117507da6be

  • SHA1

    07e42779ac99e0c4c60a1ea53de61355a76003fe

  • SHA256

    7538634c7cb678ef803b4cded9f2bad9f554d17d1e4f106f94d8a54fd5ee40b9

  • SHA512

    ed7252a896657a528f72e19fc2b5c0b1105e072fcc64510653e65b3e35a9c1ae2cdc91c1f3fba63bbbf86b948f0e2fe5f73224db6e98dca3c8fa51d11a0fc73b

  • SSDEEP

    1536:b+iFaEtB4Y//aXoo7YMMHY638X7QTW3j/VFVi/MV2CJMfdT:b+iFaEtiY/iXooMMMh387CW3j/j4SAT

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      f73702d091e7640535dda117507da6be_JaffaCakes118

    • Size

      88KB

    • MD5

      f73702d091e7640535dda117507da6be

    • SHA1

      07e42779ac99e0c4c60a1ea53de61355a76003fe

    • SHA256

      7538634c7cb678ef803b4cded9f2bad9f554d17d1e4f106f94d8a54fd5ee40b9

    • SHA512

      ed7252a896657a528f72e19fc2b5c0b1105e072fcc64510653e65b3e35a9c1ae2cdc91c1f3fba63bbbf86b948f0e2fe5f73224db6e98dca3c8fa51d11a0fc73b

    • SSDEEP

      1536:b+iFaEtB4Y//aXoo7YMMHY638X7QTW3j/VFVi/MV2CJMfdT:b+iFaEtiY/iXooMMMh387CW3j/j4SAT

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks