General

  • Target

    1d0fd2a7eb944863444a4eda7f3c4272_JaffaCakes118

  • Size

    138KB

  • Sample

    240702-ahtnwsscrk

  • MD5

    1d0fd2a7eb944863444a4eda7f3c4272

  • SHA1

    25de9b820e7ccb10498666bdc2e4faf980a31543

  • SHA256

    5408f860d49bc2bd525c5a86c6bdba2f77a50950118675bc7fe3e4dd3f485456

  • SHA512

    5c4b86696302077821d20dc2851a83d64dc03e5daf67c8291e8a648fa34ee9f43b160ef25204e74e0168c0c62bbf22b2b00e8973b31d8a99a2b0a7679eea27a6

  • SSDEEP

    3072:uouHQyPemZ32QzqFjXz3Pr/YB0LsUmIG/XWU7Q:VUQyPem52Qszz3D/VLsgK57

Malware Config

Extracted

Family

metasploit

Version

encoder/fnstenv_mov

Targets

    • Target

      1d0fd2a7eb944863444a4eda7f3c4272_JaffaCakes118

    • Size

      138KB

    • MD5

      1d0fd2a7eb944863444a4eda7f3c4272

    • SHA1

      25de9b820e7ccb10498666bdc2e4faf980a31543

    • SHA256

      5408f860d49bc2bd525c5a86c6bdba2f77a50950118675bc7fe3e4dd3f485456

    • SHA512

      5c4b86696302077821d20dc2851a83d64dc03e5daf67c8291e8a648fa34ee9f43b160ef25204e74e0168c0c62bbf22b2b00e8973b31d8a99a2b0a7679eea27a6

    • SSDEEP

      3072:uouHQyPemZ32QzqFjXz3Pr/YB0LsUmIG/XWU7Q:VUQyPem52Qszz3D/VLsgK57

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Matrix

Tasks