General
-
Target
d0411053519094bd3fcf50bf1732b495_JaffaCakes118
-
Size
47KB
-
Sample
240906-xpff6stbma
-
MD5
d0411053519094bd3fcf50bf1732b495
-
SHA1
58b55fa9c19b7f9361297ed0659e78f01336929a
-
SHA256
666562eba35fda72fea7026c9a142c05d6f9ef7cb0f15902a8e3bf5974fe90a9
-
SHA512
d115b2aa419889f4c507b2bd37f73d65c33f6ceedbeb0c458b2b9611ccfdd8d85556e4b31521bed2c287f57d6f9ee361c7f1431d59154e2d5067d1598d3e1fa2
-
SSDEEP
768:v5scsxI71Hv2mTEb4YXVzancAloPCx+k2uIuHtod6gWtxVjkeaPnAJWAEnRmtls:v5sc375Ab4EBanICQFuIiyd6gWHpkeaV
Static task
static1
Behavioral task
behavioral1
Sample
d0411053519094bd3fcf50bf1732b495_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0411053519094bd3fcf50bf1732b495_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
d0411053519094bd3fcf50bf1732b495_JaffaCakes118
-
Size
47KB
-
MD5
d0411053519094bd3fcf50bf1732b495
-
SHA1
58b55fa9c19b7f9361297ed0659e78f01336929a
-
SHA256
666562eba35fda72fea7026c9a142c05d6f9ef7cb0f15902a8e3bf5974fe90a9
-
SHA512
d115b2aa419889f4c507b2bd37f73d65c33f6ceedbeb0c458b2b9611ccfdd8d85556e4b31521bed2c287f57d6f9ee361c7f1431d59154e2d5067d1598d3e1fa2
-
SSDEEP
768:v5scsxI71Hv2mTEb4YXVzancAloPCx+k2uIuHtod6gWtxVjkeaPnAJWAEnRmtls:v5sc375Ab4EBanICQFuIiyd6gWHpkeaV
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies firewall policy service
-
Modifies security service
-
Drops file in System32 directory
-