General
-
Target
e9d904cf365b771066b1ab1aef1d8923_JaffaCakes118
-
Size
127KB
-
Sample
240409-m7khqsgf6s
-
MD5
e9d904cf365b771066b1ab1aef1d8923
-
SHA1
3a495322005fe760f1f178efec3561b20ee1fa7b
-
SHA256
b9645323fb40eae7e7b97423e25eff56345691b48415f4602962a86b52e7b272
-
SHA512
00b6e08970a7bc8a17be05cea363002ead552a9bb5204a07d7aa06594820e357ede84430ba4f62836dc4ab5fd4d0c775c86a0f5e459e6b07668b44161890dbbb
-
SSDEEP
384:/Bzhu1KO2jIf7kqbXdC3mD5z4onsND5DXP0M2vYCAGykBRSG/u/Ub8S6rDqnv47Y:zuCkdC2D5z4oWV0OCAB4Rld8Inv47
Behavioral task
behavioral1
Sample
e9d904cf365b771066b1ab1aef1d8923_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e9d904cf365b771066b1ab1aef1d8923_JaffaCakes118.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
e9d904cf365b771066b1ab1aef1d8923_JaffaCakes118
-
Size
127KB
-
MD5
e9d904cf365b771066b1ab1aef1d8923
-
SHA1
3a495322005fe760f1f178efec3561b20ee1fa7b
-
SHA256
b9645323fb40eae7e7b97423e25eff56345691b48415f4602962a86b52e7b272
-
SHA512
00b6e08970a7bc8a17be05cea363002ead552a9bb5204a07d7aa06594820e357ede84430ba4f62836dc4ab5fd4d0c775c86a0f5e459e6b07668b44161890dbbb
-
SSDEEP
384:/Bzhu1KO2jIf7kqbXdC3mD5z4onsND5DXP0M2vYCAGykBRSG/u/Ub8S6rDqnv47Y:zuCkdC2D5z4oWV0OCAB4Rld8Inv47
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Drops file in System32 directory
-