General
-
Target
dcf23f4b8d8c2ac747b83d65afcf5e77_JaffaCakes118
-
Size
380KB
-
Sample
240912-ymr8ma1fmq
-
MD5
dcf23f4b8d8c2ac747b83d65afcf5e77
-
SHA1
86d032a7ce61f34b880908d441b85856c4234ee0
-
SHA256
eb2ec9859d7c87b0f71b1616fc481a2a0226d4403e3f4894218a394f32269199
-
SHA512
6295a17edc8ebda7af13ea82b035bc7aae92dd9dc0c0737ac05fd2ebec12b604b9ac8e187bd85da7ed66d2be61324fc6c21f81566ada92e0039450a18abf34c7
-
SSDEEP
6144:WRjfpbvNzGn6+MT1k6CW3e0dZfFgCZTdsmnElX9mzHsmaEJFLaXupTR5QWfdH:WRjfHza6+M5ko1dTdxGmnOX9uhL+KT4c
Static task
static1
Behavioral task
behavioral1
Sample
dcf23f4b8d8c2ac747b83d65afcf5e77_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dcf23f4b8d8c2ac747b83d65afcf5e77_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
dcf23f4b8d8c2ac747b83d65afcf5e77_JaffaCakes118
-
Size
380KB
-
MD5
dcf23f4b8d8c2ac747b83d65afcf5e77
-
SHA1
86d032a7ce61f34b880908d441b85856c4234ee0
-
SHA256
eb2ec9859d7c87b0f71b1616fc481a2a0226d4403e3f4894218a394f32269199
-
SHA512
6295a17edc8ebda7af13ea82b035bc7aae92dd9dc0c0737ac05fd2ebec12b604b9ac8e187bd85da7ed66d2be61324fc6c21f81566ada92e0039450a18abf34c7
-
SSDEEP
6144:WRjfpbvNzGn6+MT1k6CW3e0dZfFgCZTdsmnElX9mzHsmaEJFLaXupTR5QWfdH:WRjfHza6+M5ko1dTdxGmnOX9uhL+KT4c
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-