General
-
Target
87481df9c9aac34e82309f6f7e03ec69_JaffaCakes118
-
Size
972KB
-
Sample
240810-xpgdgatakq
-
MD5
87481df9c9aac34e82309f6f7e03ec69
-
SHA1
2a20735f9578138c16395e914230a4ba061295bf
-
SHA256
460a82fb2b9bfbe8b3eef6f18d7d3dc6fad28df72bb3c028600fc98077dbe68b
-
SHA512
1443171e1b236c58db03857a0de0c321f7fb62b1de8a205d2fff40847a917f2803441aceac1ec44f06c6551591ac58cb4ef7fa147207a1e7c19df5033373e2e0
-
SSDEEP
24576:ve7UcqiLnJWlGcmJ2TrBMvJfdwsJ/Xonp/SO/D5Ob/a:v3+J2TrBMRfwp/SO/NOW
Behavioral task
behavioral1
Sample
87481df9c9aac34e82309f6f7e03ec69_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
87481df9c9aac34e82309f6f7e03ec69_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
87481df9c9aac34e82309f6f7e03ec69_JaffaCakes118
-
Size
972KB
-
MD5
87481df9c9aac34e82309f6f7e03ec69
-
SHA1
2a20735f9578138c16395e914230a4ba061295bf
-
SHA256
460a82fb2b9bfbe8b3eef6f18d7d3dc6fad28df72bb3c028600fc98077dbe68b
-
SHA512
1443171e1b236c58db03857a0de0c321f7fb62b1de8a205d2fff40847a917f2803441aceac1ec44f06c6551591ac58cb4ef7fa147207a1e7c19df5033373e2e0
-
SSDEEP
24576:ve7UcqiLnJWlGcmJ2TrBMvJfdwsJ/Xonp/SO/D5Ob/a:v3+J2TrBMRfwp/SO/NOW
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Sets service image path in registry
-