General
-
Target
dd47cdc584c1934835e2f8d3ebd55c49_JaffaCakes118
-
Size
626KB
-
Sample
240912-316ematbmc
-
MD5
dd47cdc584c1934835e2f8d3ebd55c49
-
SHA1
43fc40273dd033b2e391e6eda38f49437d477887
-
SHA256
4eb8f41983ee7f2d4c4fbc0c522015d83af600665f7202d20bab6b2fb00c88bc
-
SHA512
f776bccc9cf0dfe83caeb509835ed5884d137148bccad1d5454df6f9b90e4e6b0488c3b79432c1ff4ca333d1f4dc773d63f1813b61ea16211a3789cf0b2fc05c
-
SSDEEP
12288:KBitsaJiKq+IvmAU8e5i88xsTmOg+LuxMTWNm868Oa2hcEiP/3IWVJ/ux9cb0G:KntKq+JF8Ei88yTmr+LuxMW6E/7
Behavioral task
behavioral1
Sample
dd47cdc584c1934835e2f8d3ebd55c49_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dd47cdc584c1934835e2f8d3ebd55c49_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
192.168.1.253:65535
Targets
-
-
Target
dd47cdc584c1934835e2f8d3ebd55c49_JaffaCakes118
-
Size
626KB
-
MD5
dd47cdc584c1934835e2f8d3ebd55c49
-
SHA1
43fc40273dd033b2e391e6eda38f49437d477887
-
SHA256
4eb8f41983ee7f2d4c4fbc0c522015d83af600665f7202d20bab6b2fb00c88bc
-
SHA512
f776bccc9cf0dfe83caeb509835ed5884d137148bccad1d5454df6f9b90e4e6b0488c3b79432c1ff4ca333d1f4dc773d63f1813b61ea16211a3789cf0b2fc05c
-
SSDEEP
12288:KBitsaJiKq+IvmAU8e5i88xsTmOg+LuxMTWNm868Oa2hcEiP/3IWVJ/ux9cb0G:KntKq+JF8Ei88yTmr+LuxMW6E/7
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-