General
-
Target
b9c5cccf05c91ed4f16aa455ba3b6c15_JaffaCakes118
-
Size
246KB
-
Sample
240823-bjc8zazdrl
-
MD5
b9c5cccf05c91ed4f16aa455ba3b6c15
-
SHA1
d160411467f774c10b1b0a59c2bfe7ad19027832
-
SHA256
8d64de7fdbfd14b6bd4d24ff07ce6d4f91fe712172c5508b24fa2f740918ac6f
-
SHA512
ec66b8b1d956efffd4e20c7a33ab0a929daab151506a7db0b617440ccce882a9dc47d52c4be61992063289295e49f5b6ecf450dc18b2e8960c6ff9d6d0a8d933
-
SSDEEP
6144:k3GbsdGhWwplZGwL7Ioe27ezVEd5HphJVSkizwD:sGcGhFpfUt2qpohHSO
Static task
static1
Behavioral task
behavioral1
Sample
b9c5cccf05c91ed4f16aa455ba3b6c15_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b9c5cccf05c91ed4f16aa455ba3b6c15_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
192.0.2.112:1234
Targets
-
-
Target
b9c5cccf05c91ed4f16aa455ba3b6c15_JaffaCakes118
-
Size
246KB
-
MD5
b9c5cccf05c91ed4f16aa455ba3b6c15
-
SHA1
d160411467f774c10b1b0a59c2bfe7ad19027832
-
SHA256
8d64de7fdbfd14b6bd4d24ff07ce6d4f91fe712172c5508b24fa2f740918ac6f
-
SHA512
ec66b8b1d956efffd4e20c7a33ab0a929daab151506a7db0b617440ccce882a9dc47d52c4be61992063289295e49f5b6ecf450dc18b2e8960c6ff9d6d0a8d933
-
SSDEEP
6144:k3GbsdGhWwplZGwL7Ioe27ezVEd5HphJVSkizwD:sGcGhFpfUt2qpohHSO
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-