General

  • Target

    JaffaCakes118_8adbc88e85dbe036a70626dfd16da4bf

  • Size

    254KB

  • Sample

    250328-vmtvnsyxdw

  • MD5

    8adbc88e85dbe036a70626dfd16da4bf

  • SHA1

    640bf35d732b08a9e24b93be23b5075a67beecbc

  • SHA256

    3b07e128ed2ebc9a373f09ff3fec29889d441e5b1af1a6c907424ebbf8c8415b

  • SHA512

    5211850a71a0710da7650f308166c3d36c985f1ccf3c2bf7271e88e726fcc99c69bd8d0fbe4ae12bf6577896a3d6280c8e7cfc5851e24c32b448ef3228a1ebfe

  • SSDEEP

    6144:jlo1JVAuafRj0jwbe91xrhwAwhBbxBjbnY+iIZVhBpDXNTl9:RWjW50sePduAwlBvnYJIZVv/l9

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      JaffaCakes118_8adbc88e85dbe036a70626dfd16da4bf

    • Size

      254KB

    • MD5

      8adbc88e85dbe036a70626dfd16da4bf

    • SHA1

      640bf35d732b08a9e24b93be23b5075a67beecbc

    • SHA256

      3b07e128ed2ebc9a373f09ff3fec29889d441e5b1af1a6c907424ebbf8c8415b

    • SHA512

      5211850a71a0710da7650f308166c3d36c985f1ccf3c2bf7271e88e726fcc99c69bd8d0fbe4ae12bf6577896a3d6280c8e7cfc5851e24c32b448ef3228a1ebfe

    • SSDEEP

      6144:jlo1JVAuafRj0jwbe91xrhwAwhBbxBjbnY+iIZVhBpDXNTl9:RWjW50sePduAwlBvnYJIZVv/l9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks