General

  • Target

    19b1ef52243d9eb67d59872970b1ce53_JaffaCakes118

  • Size

    212KB

  • Sample

    240628-lv46yatamb

  • MD5

    19b1ef52243d9eb67d59872970b1ce53

  • SHA1

    5a6b7f101cbcb43c278ee4f916d8710b23e10321

  • SHA256

    954f50be8810c7d138d0b295a720bb7e268afd23b6ceccf61413e4816ab89cd0

  • SHA512

    c711df2b10509ef23c2ae196d70474667d52ee6ee5afd5c190e805e9d15c9cf87b1b552c8b97dd69a9b0fa8dc1f49cf79562c00d1eb19d45069f61d94ddb6806

  • SSDEEP

    6144:cRxlIA8ugFFnrXfg6XM8Xx9mhzTxL7bVbksB:c6Ki5rY6z9mFxTFRB

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      19b1ef52243d9eb67d59872970b1ce53_JaffaCakes118

    • Size

      212KB

    • MD5

      19b1ef52243d9eb67d59872970b1ce53

    • SHA1

      5a6b7f101cbcb43c278ee4f916d8710b23e10321

    • SHA256

      954f50be8810c7d138d0b295a720bb7e268afd23b6ceccf61413e4816ab89cd0

    • SHA512

      c711df2b10509ef23c2ae196d70474667d52ee6ee5afd5c190e805e9d15c9cf87b1b552c8b97dd69a9b0fa8dc1f49cf79562c00d1eb19d45069f61d94ddb6806

    • SSDEEP

      6144:cRxlIA8ugFFnrXfg6XM8Xx9mhzTxL7bVbksB:c6Ki5rY6z9mFxTFRB

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks