Behavioral task
behavioral1
Sample
bcdf942465c8b40c24c5e1652e35ab97_JaffaCakes118.ps1
Resource
win7-20240221-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
bcdf942465c8b40c24c5e1652e35ab97_JaffaCakes118.ps1
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
bcdf942465c8b40c24c5e1652e35ab97_JaffaCakes118
-
Size
3KB
-
MD5
bcdf942465c8b40c24c5e1652e35ab97
-
SHA1
bfec73d97d30d5b1d2f5f40b57d87b7e83198aed
-
SHA256
36a085c0b2a72e653ababc864cb7395c1c4696c0ef1b06cb4d6dcbe3fee08ff8
-
SHA512
bda0beb60fab64d08d96622c51c88cb9f4f05ef51ff7c9d9f4c02c4bb9bbf7d702658df228870506bc98114c34ce7cf21035fc9a0ad3035bba7044519ba34622
Score
10/10
Malware Config
Extracted
Family
metasploit
Version
encoder/shikata_ga_nai
Extracted
Family
metasploit
Version
windows/reverse_tcp
C2
192.168.1.8:4444
Signatures
-
Metasploit family
Files
-
bcdf942465c8b40c24c5e1652e35ab97_JaffaCakes118.ps1