General

  • Target

    203faeab73cd2cb1e4e588bc0628b8b0_JaffaCakes118

  • Size

    380KB

  • Sample

    240702-v91azaxhnl

  • MD5

    203faeab73cd2cb1e4e588bc0628b8b0

  • SHA1

    6d1692b64010b050f09ada59fb4a717aecdfce2c

  • SHA256

    01fe98d1464dc41e6bb58188655dd4bc1f969726c6a7e5b2b1c88d52914a3742

  • SHA512

    ddfdc090b41f419844d8e6c35c7dc411b3335ed516d9d25bd5b1c0046a3ada2fa173941ef6c360f937a4e9e825490bf6b694e177cfc593c3ce43d48763812efe

  • SSDEEP

    6144:I9inN+UqL02g1gH2H4gCW3e0dZfFgCZTdsmnElM2/uLYwG2iIMRD51TK7HV/Smhc:0ipHgWYO1dTdxGmnO9/1Ft2SGjFW

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      203faeab73cd2cb1e4e588bc0628b8b0_JaffaCakes118

    • Size

      380KB

    • MD5

      203faeab73cd2cb1e4e588bc0628b8b0

    • SHA1

      6d1692b64010b050f09ada59fb4a717aecdfce2c

    • SHA256

      01fe98d1464dc41e6bb58188655dd4bc1f969726c6a7e5b2b1c88d52914a3742

    • SHA512

      ddfdc090b41f419844d8e6c35c7dc411b3335ed516d9d25bd5b1c0046a3ada2fa173941ef6c360f937a4e9e825490bf6b694e177cfc593c3ce43d48763812efe

    • SSDEEP

      6144:I9inN+UqL02g1gH2H4gCW3e0dZfFgCZTdsmnElM2/uLYwG2iIMRD51TK7HV/Smhc:0ipHgWYO1dTdxGmnO9/1Ft2SGjFW

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix

Tasks