General
-
Target
16d73ca6f773f41090bbe6c19abe162d_JaffaCakes118
-
Size
164KB
-
Sample
240627-vvvrya1fph
-
MD5
16d73ca6f773f41090bbe6c19abe162d
-
SHA1
c90cde785490e124fe9c4f063f93c03a232a3d3c
-
SHA256
b2fe1c73147c73bed1285f439d69410803b5e845d4dff7b26b77ebf9f1ca7bcc
-
SHA512
af569f927b70a35cd2c359ec5d50150ba4f93f019b4e51eb0904e4de4626d3050f15751e42394be871a1d7653956078a98c036885b4e03db9375a3f89fd675a9
-
SSDEEP
1536:lLnPykk5ToH44Zg354IrCs2C7Oxy5romOlAh9YZLnPe0LwP3wWAKRyzv:NnPyn5cs54IrccS4ob09YZnPfMPXR0v
Behavioral task
behavioral1
Sample
16d73ca6f773f41090bbe6c19abe162d_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
16d73ca6f773f41090bbe6c19abe162d_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Targets
-
-
Target
16d73ca6f773f41090bbe6c19abe162d_JaffaCakes118
-
Size
164KB
-
MD5
16d73ca6f773f41090bbe6c19abe162d
-
SHA1
c90cde785490e124fe9c4f063f93c03a232a3d3c
-
SHA256
b2fe1c73147c73bed1285f439d69410803b5e845d4dff7b26b77ebf9f1ca7bcc
-
SHA512
af569f927b70a35cd2c359ec5d50150ba4f93f019b4e51eb0904e4de4626d3050f15751e42394be871a1d7653956078a98c036885b4e03db9375a3f89fd675a9
-
SSDEEP
1536:lLnPykk5ToH44Zg354IrCs2C7Oxy5romOlAh9YZLnPe0LwP3wWAKRyzv:NnPyn5cs54IrccS4ob09YZnPfMPXR0v
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-