General

  • Target

    JaffaCakes118_8d6dc593348ca7c4130ace16014c839113e053c32b0aad090ffd2605a63664b0

  • Size

    4.7MB

  • Sample

    241226-tztj1a1kcj

  • MD5

    fc595b1bd200a573cf48b01ab3ae4162

  • SHA1

    dad3351779976f6bdc5163048f94d65224f59422

  • SHA256

    8d6dc593348ca7c4130ace16014c839113e053c32b0aad090ffd2605a63664b0

  • SHA512

    b3d4271f1ea00f54045fa5b471c1a8bd82148f8fb5e5e0cda1e2e22604e32bcebb3f18d114b579c6357c64bd3aea2714f34892d68c694f0a25bbc905de19445e

  • SSDEEP

    98304:03VPtZAzKaFlgxPQpBdyOD2g4CKcC4jueR7f0bEv6PujJNKE4WQCNX:aVczjlgxIBseVsv0rBfAo6SDKrWQiX

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_http

C2

http://91.241.19.207:443/97EP_udjldzcTt1PvRKMhAxlqtuNLZq19NohJ2anZLpZuTJHmyyT5YFzm

Targets

    • Target

      b8990f204ca595e23562aa8063fd163651771626ba4acf45890f25315616fc1e

    • Size

      6.0MB

    • MD5

      b2de6e79656610e61aeb54529ca6f618

    • SHA1

      7320fba8d48c7d1c122f2a56e2bfd7554da3bb8a

    • SHA256

      b8990f204ca595e23562aa8063fd163651771626ba4acf45890f25315616fc1e

    • SHA512

      4b545c8a6351d2bf9ced772ba10d97d6f3a279e77353de77edd223c78331c24003e224f49f5b343e3a36be3079b982625b0fca078def73f3bfd4e585ad0e433d

    • SSDEEP

      98304:mH7CgqLPRPYv7cZuwYx72XPo0+XH6zVjAcJya7GLmlv9OHwqmFNlG4tg/uLqxBAX:C+gqLKB2pEcDyadvlDtyuC+IK0G

    • Babadeda

      Babadeda is a crypter delivered as a legitimate installer and used to drop other malware families.

    • Babadeda Crypter

    • Babadeda family

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Executes dropped EXE

    • Loads dropped DLL

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks