General
-
Target
0920b9e522616ae611baffa929eef8b6_JaffaCakes118
-
Size
249KB
-
Sample
240620-x9ny2sybjp
-
MD5
0920b9e522616ae611baffa929eef8b6
-
SHA1
e3dd150b2db203cd062ff4360ad751d90beea7ce
-
SHA256
f8babbca64eb2adfdc93297f917cdf6e556f839a8dc9a06cf5c5dfab81f340d0
-
SHA512
3e97ac8237e1fba7ec6b5b1bec363116532b63eb1b86bb72768389e4eed4159580b42b46cda3ba4354c70c67873c7b847134e9ea99a99866370b422592369cdc
-
SSDEEP
6144:DOS2TjP4CboQO6pPzYDcKL65/RKXtdkpnO:DOS2PP4CboEp0aBRKXDkpnO
Static task
static1
Behavioral task
behavioral1
Sample
0920b9e522616ae611baffa929eef8b6_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0920b9e522616ae611baffa929eef8b6_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
0920b9e522616ae611baffa929eef8b6_JaffaCakes118
-
Size
249KB
-
MD5
0920b9e522616ae611baffa929eef8b6
-
SHA1
e3dd150b2db203cd062ff4360ad751d90beea7ce
-
SHA256
f8babbca64eb2adfdc93297f917cdf6e556f839a8dc9a06cf5c5dfab81f340d0
-
SHA512
3e97ac8237e1fba7ec6b5b1bec363116532b63eb1b86bb72768389e4eed4159580b42b46cda3ba4354c70c67873c7b847134e9ea99a99866370b422592369cdc
-
SSDEEP
6144:DOS2TjP4CboQO6pPzYDcKL65/RKXtdkpnO:DOS2PP4CboEp0aBRKXDkpnO
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Suspicious use of SetThreadContext
-