General

  • Target

    JaffaCakes118_637ff7ecfe1d5e74fc4363473126812b

  • Size

    54KB

  • Sample

    250102-h69c9azrav

  • MD5

    637ff7ecfe1d5e74fc4363473126812b

  • SHA1

    f6175edfb1b743507e226992953551d4961c8ff2

  • SHA256

    c229cec26167147b498a452c701ffb9b5424c74644d2f69709e7f3d65ff81ada

  • SHA512

    bbbf3d534547ab6654de7dc5dd3ce8f3a82ee2718460e5f9a4b205ac7891a0c8a984897ab2cca125b55a0ebc48077041b473972fd6bfca834f3244d6a37e1966

  • SSDEEP

    1536:sKzw19HD6xvOK3xtlhJzsq433C01C7g/fSGBH:IHDE5srCJg/fSGBH

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      JaffaCakes118_637ff7ecfe1d5e74fc4363473126812b

    • Size

      54KB

    • MD5

      637ff7ecfe1d5e74fc4363473126812b

    • SHA1

      f6175edfb1b743507e226992953551d4961c8ff2

    • SHA256

      c229cec26167147b498a452c701ffb9b5424c74644d2f69709e7f3d65ff81ada

    • SHA512

      bbbf3d534547ab6654de7dc5dd3ce8f3a82ee2718460e5f9a4b205ac7891a0c8a984897ab2cca125b55a0ebc48077041b473972fd6bfca834f3244d6a37e1966

    • SSDEEP

      1536:sKzw19HD6xvOK3xtlhJzsq433C01C7g/fSGBH:IHDE5srCJg/fSGBH

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks