General

  • Target

    JaffaCakes118_5ea5f4529955c637d17536e8760c3835

  • Size

    46KB

  • Sample

    250101-wdh79aykfp

  • MD5

    5ea5f4529955c637d17536e8760c3835

  • SHA1

    e35dfedf008cb143f3ebc6cbbee498edbd935177

  • SHA256

    6932f5c845848c3b8d283d7cd805830eac4d1052fa39b95ef0691e957be2a417

  • SHA512

    ffff3eb8d822e3fc237f8fc6be5cdefebed68ca82f45f2254250be80091d26684abb9477746a8d438c3e5167071cc1bff0d927b9438b21412e726beed197c58c

  • SSDEEP

    768:oJOuKOVbv+18TV6VjnY5MTbmN5iRCaXC0FpL8fSlzXsJycERLj9loJ4UkQD/FdP:oJOuKOOkuY5WijiRnFpQ+sJbmlomJQDD

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      JaffaCakes118_5ea5f4529955c637d17536e8760c3835

    • Size

      46KB

    • MD5

      5ea5f4529955c637d17536e8760c3835

    • SHA1

      e35dfedf008cb143f3ebc6cbbee498edbd935177

    • SHA256

      6932f5c845848c3b8d283d7cd805830eac4d1052fa39b95ef0691e957be2a417

    • SHA512

      ffff3eb8d822e3fc237f8fc6be5cdefebed68ca82f45f2254250be80091d26684abb9477746a8d438c3e5167071cc1bff0d927b9438b21412e726beed197c58c

    • SSDEEP

      768:oJOuKOVbv+18TV6VjnY5MTbmN5iRCaXC0FpL8fSlzXsJycERLj9loJ4UkQD/FdP:oJOuKOOkuY5WijiRnFpQ+sJbmlomJQDD

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks