General
-
Target
96df70b5eab5afbd0c4f80d9c58e3567_JaffaCakes118
-
Size
339KB
-
Sample
240814-vdcvsssgnc
-
MD5
96df70b5eab5afbd0c4f80d9c58e3567
-
SHA1
f91c4e9e308545f0580d37f801437f0157dcb110
-
SHA256
36700aa8cd9d7740201f12f90f6335942ac5ec7ef3abef91d0e1125a1b9deb77
-
SHA512
038291cfd1d3fdc49d67b9097862f9a9625a7082eca30850a6c004f9fa11bcd1f0370e8033c3da4f35da2345ceb66980678bc8fad293388c31bf3020fc807463
-
SSDEEP
6144:vWwgsk6J6MbyZgdGr78Ez4Mp1gdpk7NG0bGbld0aBr8HHBNZv1jz15eLV6:vWwgsk6Ywyrf8Ez4Ums7zbGbld0EAR17
Behavioral task
behavioral1
Sample
96df70b5eab5afbd0c4f80d9c58e3567_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
96df70b5eab5afbd0c4f80d9c58e3567_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/shell_reverse_tcp
172.16.1.25:80
Targets
-
-
Target
96df70b5eab5afbd0c4f80d9c58e3567_JaffaCakes118
-
Size
339KB
-
MD5
96df70b5eab5afbd0c4f80d9c58e3567
-
SHA1
f91c4e9e308545f0580d37f801437f0157dcb110
-
SHA256
36700aa8cd9d7740201f12f90f6335942ac5ec7ef3abef91d0e1125a1b9deb77
-
SHA512
038291cfd1d3fdc49d67b9097862f9a9625a7082eca30850a6c004f9fa11bcd1f0370e8033c3da4f35da2345ceb66980678bc8fad293388c31bf3020fc807463
-
SSDEEP
6144:vWwgsk6J6MbyZgdGr78Ez4Mp1gdpk7NG0bGbld0aBr8HHBNZv1jz15eLV6:vWwgsk6Ywyrf8Ez4Ums7zbGbld0EAR17
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE
-
Loads dropped DLL
-