General
-
Target
d9ad087d16bb0338201d443e5cd842d7_JaffaCakes118
-
Size
666KB
-
Sample
240911-fwfbbaveqe
-
MD5
d9ad087d16bb0338201d443e5cd842d7
-
SHA1
b56fa87e9fc56e0d893c89a802738bbde8f4f716
-
SHA256
5eef56af0ee75ed1dc46808da988171bac6621184f2e0507062f4f5f4e753b98
-
SHA512
39b89c7a8287e79c0bb30c9fbf613f87f809852fd17106ae5e0b5ee691d853e7cab31777d9cf43cc907f3b40c58e8c691cd2ef2586d55c7247f31a0427e09308
-
SSDEEP
12288:xXR2YWp551IHaDJj2bvNRQSpe+BAEOgyFWhT/HVwv/z4bUsllG6EyEuSglq:nxI551I6DJj2bvNRQ1sAEEe1wnzgPs6+
Static task
static1
Behavioral task
behavioral1
Sample
d9ad087d16bb0338201d443e5cd842d7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d9ad087d16bb0338201d443e5cd842d7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
192.168.15.5:443
Targets
-
-
Target
d9ad087d16bb0338201d443e5cd842d7_JaffaCakes118
-
Size
666KB
-
MD5
d9ad087d16bb0338201d443e5cd842d7
-
SHA1
b56fa87e9fc56e0d893c89a802738bbde8f4f716
-
SHA256
5eef56af0ee75ed1dc46808da988171bac6621184f2e0507062f4f5f4e753b98
-
SHA512
39b89c7a8287e79c0bb30c9fbf613f87f809852fd17106ae5e0b5ee691d853e7cab31777d9cf43cc907f3b40c58e8c691cd2ef2586d55c7247f31a0427e09308
-
SSDEEP
12288:xXR2YWp551IHaDJj2bvNRQSpe+BAEOgyFWhT/HVwv/z4bUsllG6EyEuSglq:nxI551I6DJj2bvNRQ1sAEEe1wnzgPs6+
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Suspicious use of SetThreadContext
-