General
-
Target
dbe9909511a41ba1f2dadd81f0417c99_JaffaCakes118
-
Size
245KB
-
Sample
240912-gc8destenn
-
MD5
dbe9909511a41ba1f2dadd81f0417c99
-
SHA1
f25360c3c3ecf2710842461830f64faa1dbe5499
-
SHA256
b52ae54ce845b4794800b595ffb8e62f57dd19a4bb7e4d00e8ad2c1696973f33
-
SHA512
a4246da8fad369bc18523c9d9ce1107dd2752a2272ec32e9c7c9c279c8b4218224ea8bef4b8eb6bbac346c57cb22d63bf663ba0fe2e27827dd14fbe01782ed90
-
SSDEEP
6144:OmKxZKomT8RXKUUrT+GIqDQZSY0G7hgrAkRpUZfk0BUC1Eqe:OmKjU8XUn+GIqDQZSfGVSRG20ee
Behavioral task
behavioral1
Sample
dbe9909511a41ba1f2dadd81f0417c99_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
dbe9909511a41ba1f2dadd81f0417c99_JaffaCakes118
-
Size
245KB
-
MD5
dbe9909511a41ba1f2dadd81f0417c99
-
SHA1
f25360c3c3ecf2710842461830f64faa1dbe5499
-
SHA256
b52ae54ce845b4794800b595ffb8e62f57dd19a4bb7e4d00e8ad2c1696973f33
-
SHA512
a4246da8fad369bc18523c9d9ce1107dd2752a2272ec32e9c7c9c279c8b4218224ea8bef4b8eb6bbac346c57cb22d63bf663ba0fe2e27827dd14fbe01782ed90
-
SSDEEP
6144:OmKxZKomT8RXKUUrT+GIqDQZSY0G7hgrAkRpUZfk0BUC1Eqe:OmKjU8XUn+GIqDQZSfGVSRG20ee
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-