General

  • Target

    JaffaCakes118_bbc7b46f6d0713910da177ae15a0a7e8

  • Size

    221KB

  • Sample

    250418-aqkqysyms6

  • MD5

    bbc7b46f6d0713910da177ae15a0a7e8

  • SHA1

    7a1f17df1956019475445b02d2b6cf0219f8ea8b

  • SHA256

    63a0481af7fbbb4f1b32728d90e00bd860e7172aa7be4cac9aa8023422534dab

  • SHA512

    1563365b484f55309a534e69b3655ce276d3b24f809af7f0be04bdacc7dbb2c748a27dfd988307126d24788e1cd4484345ae2f0268314de96dd0e7e992868e05

  • SSDEEP

    6144:/gU6qjunLsOI2bKmLPbBnBmVxEYMUe+lntZGprGegxE:/1uLsOIO/PbBBmETUe+ZtZAYxE

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      JaffaCakes118_bbc7b46f6d0713910da177ae15a0a7e8

    • Size

      221KB

    • MD5

      bbc7b46f6d0713910da177ae15a0a7e8

    • SHA1

      7a1f17df1956019475445b02d2b6cf0219f8ea8b

    • SHA256

      63a0481af7fbbb4f1b32728d90e00bd860e7172aa7be4cac9aa8023422534dab

    • SHA512

      1563365b484f55309a534e69b3655ce276d3b24f809af7f0be04bdacc7dbb2c748a27dfd988307126d24788e1cd4484345ae2f0268314de96dd0e7e992868e05

    • SSDEEP

      6144:/gU6qjunLsOI2bKmLPbBnBmVxEYMUe+lntZGprGegxE:/1uLsOIO/PbBBmETUe+ZtZAYxE

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v16

Tasks