General

  • Target

    1abfd425b1b20defa6960e22709199d0_JaffaCakes118

  • Size

    380KB

  • Sample

    240701-lbn1lsxalq

  • MD5

    1abfd425b1b20defa6960e22709199d0

  • SHA1

    12a7db55edcde87f7e8364d215ad2930676d0050

  • SHA256

    7844dc51ebf131f26ebce7a40d67095deff352229638345270132abefa945c29

  • SHA512

    fee6d34cfe2e56c7f83adf76c5f457205c3f687c615da61de8051541ba64e083875772a8baf7e8c39ee77fd3fb6d6579354241b04854d6531fd3bdb2722e1222

  • SSDEEP

    6144:WRjfpbvNzGn6+MT1k6CW3e0dZfFgCZTdsmnElX9mzHsmaEJFLaXupTR5QWfd3:WRjfHza6+M5ko1dTdxGmnOX9uhL+KT4i

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      1abfd425b1b20defa6960e22709199d0_JaffaCakes118

    • Size

      380KB

    • MD5

      1abfd425b1b20defa6960e22709199d0

    • SHA1

      12a7db55edcde87f7e8364d215ad2930676d0050

    • SHA256

      7844dc51ebf131f26ebce7a40d67095deff352229638345270132abefa945c29

    • SHA512

      fee6d34cfe2e56c7f83adf76c5f457205c3f687c615da61de8051541ba64e083875772a8baf7e8c39ee77fd3fb6d6579354241b04854d6531fd3bdb2722e1222

    • SSDEEP

      6144:WRjfpbvNzGn6+MT1k6CW3e0dZfFgCZTdsmnElX9mzHsmaEJFLaXupTR5QWfd3:WRjfHza6+M5ko1dTdxGmnOX9uhL+KT4i

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix

Tasks