General
-
Target
dce7bd0ed581233f2dfd1e94755bb161_JaffaCakes118
-
Size
36KB
-
Sample
240912-x6qcps1ame
-
MD5
dce7bd0ed581233f2dfd1e94755bb161
-
SHA1
6ee43521544f00fa0a8eacb977b159e87fed3d6b
-
SHA256
dfc1f0eb43631662b45b2a1b58a889e70fcb61887efc7c3afe263a59f91147cb
-
SHA512
5bac652cd6b683f4e935d1b92254983b2a91ffc51c652c7a88185f32a26c3e1628a211ca07d25af10f4bd5d7716c7ee5e8476dfd875fee8f9fbe7a048228af8d
-
SSDEEP
192:4NslLZEvA+6/6rrILd/Kf3HO8tA1DkF4FnSyL/MAj2PJlPWQLM6rEr+nwOOQ2IFL:98iSUR/8dAh/5SxdW+wRSF0jk1tutY
Behavioral task
behavioral1
Sample
dce7bd0ed581233f2dfd1e94755bb161_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dce7bd0ed581233f2dfd1e94755bb161_JaffaCakes118.doc
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
metasploit_stager
10.140.58.160:4444
Targets
-
-
Target
dce7bd0ed581233f2dfd1e94755bb161_JaffaCakes118
-
Size
36KB
-
MD5
dce7bd0ed581233f2dfd1e94755bb161
-
SHA1
6ee43521544f00fa0a8eacb977b159e87fed3d6b
-
SHA256
dfc1f0eb43631662b45b2a1b58a889e70fcb61887efc7c3afe263a59f91147cb
-
SHA512
5bac652cd6b683f4e935d1b92254983b2a91ffc51c652c7a88185f32a26c3e1628a211ca07d25af10f4bd5d7716c7ee5e8476dfd875fee8f9fbe7a048228af8d
-
SSDEEP
192:4NslLZEvA+6/6rrILd/Kf3HO8tA1DkF4FnSyL/MAj2PJlPWQLM6rEr+nwOOQ2IFL:98iSUR/8dAh/5SxdW+wRSF0jk1tutY
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned suspicious child process
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
-