General
-
Target
92e7f06b1114fb53e9fe7257585d3f84_JaffaCakes118
-
Size
3KB
-
Sample
240603-2zepvadb32
-
MD5
92e7f06b1114fb53e9fe7257585d3f84
-
SHA1
ae7e1699c607aa83574108f8274ff8488c4b2cec
-
SHA256
9b23ac3682a2849fef0df636b8cdff76f09b6edd8241a2a87918a97f7705a928
-
SHA512
e51460acc7c479b21ff789ede52c460fd93c5e18dff4f477590619608e99a29bc715f15bbaebe70aef1e9fa40ab00080a56015ca2eec184c0c5145daa884a033
Behavioral task
behavioral1
Sample
92e7f06b1114fb53e9fe7257585d3f84_JaffaCakes118.pdf
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
92e7f06b1114fb53e9fe7257585d3f84_JaffaCakes118.pdf
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
template.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
template.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
metasploit
metasploit_stager
192.168.0.0:5555
Targets
-
-
Target
92e7f06b1114fb53e9fe7257585d3f84_JaffaCakes118
-
Size
3KB
-
MD5
92e7f06b1114fb53e9fe7257585d3f84
-
SHA1
ae7e1699c607aa83574108f8274ff8488c4b2cec
-
SHA256
9b23ac3682a2849fef0df636b8cdff76f09b6edd8241a2a87918a97f7705a928
-
SHA512
e51460acc7c479b21ff789ede52c460fd93c5e18dff4f477590619608e99a29bc715f15bbaebe70aef1e9fa40ab00080a56015ca2eec184c0c5145daa884a033
Score1/10 -
-
-
Target
template.pdf
-
Size
7KB
-
MD5
a426f7edacfa5d33cc41a921097b78de
-
SHA1
a53ee2954dc838b0d50b0f4e48afb4613f33c003
-
SHA256
ffe7aea508b716df3f57db414c949d33ba5e75a55cb966a6ff70cef7e4741495
-
SHA512
82b6e8cdf6d9bbcd1cb9f820be0aebe4c880259510d787c2dd9976effc328fb4537069de147dc3ef929a84f08526605baabf1f71df6d9627dcf89028d67d1b8f
-
SSDEEP
24:eFGStrJ9u0/6+WnZd0BQAVDaYNq9KZqC/eNDMSCvOfpmB:is0ru0BQats9E/SD9C2sB
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-