General
-
Target
28492c4b9e930f3481aa0b4bdd83e426_JaffaCakes118
-
Size
36KB
-
Sample
240509-ezlrtsdc66
-
MD5
28492c4b9e930f3481aa0b4bdd83e426
-
SHA1
8a5be3d55dec71c065cc5aab08468e34005f67cb
-
SHA256
6eade15ad0d8466657d14635517d5bbfe161e19e3133904a828cfdb5bab41e47
-
SHA512
46ea4ae081bc7c5026c8123f004fc82846629d216c2e8ccedc87290ef97dce752639676e14fbe897b5ba0fe2535fabc9c7ffc3f39e1efff98c5fc352af2d0b39
-
SSDEEP
768:bck3hOdsylKlgryzc4bNhZFGzE+cL2knAJiOiC6GNfM+pwqTfxIs:Qk3hOdsylKlgryzc4bNhZFGzE+cL2knt
Behavioral task
behavioral1
Sample
28492c4b9e930f3481aa0b4bdd83e426_JaffaCakes118.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
28492c4b9e930f3481aa0b4bdd83e426_JaffaCakes118.xls
Resource
win10v2004-20240426-en
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
10.196.20.185:4418
Targets
-
-
Target
28492c4b9e930f3481aa0b4bdd83e426_JaffaCakes118
-
Size
36KB
-
MD5
28492c4b9e930f3481aa0b4bdd83e426
-
SHA1
8a5be3d55dec71c065cc5aab08468e34005f67cb
-
SHA256
6eade15ad0d8466657d14635517d5bbfe161e19e3133904a828cfdb5bab41e47
-
SHA512
46ea4ae081bc7c5026c8123f004fc82846629d216c2e8ccedc87290ef97dce752639676e14fbe897b5ba0fe2535fabc9c7ffc3f39e1efff98c5fc352af2d0b39
-
SSDEEP
768:bck3hOdsylKlgryzc4bNhZFGzE+cL2knAJiOiC6GNfM+pwqTfxIs:Qk3hOdsylKlgryzc4bNhZFGzE+cL2knt
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned suspicious child process
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
-