General
-
Target
de91a7fe31ed66c3e047fb1ea1269ec8_JaffaCakes118
-
Size
1.3MB
-
Sample
240913-v3fb8azcma
-
MD5
de91a7fe31ed66c3e047fb1ea1269ec8
-
SHA1
d46c278786e2be435330fddc3d6ba1e8301cd3af
-
SHA256
a1ef37444b6e1b8a30cdeed40de0a6d7c86f750a4f2355c69a5a6849e82d772d
-
SHA512
703cf07914ff5155ccc4460e78028a89ddf97a492e2c60c6dba25c066faef522716027df38c0a0f783997f10c1079ac0e094e19a399a25d36a26a4a3e555b1bf
-
SSDEEP
24576:9rzMyPt4PdiGr/wf66m2tov+YtgVq2TiQULeMHYM/nV4hV6P0BOeMT6FJy7:9rzMtLr/wf664HtW/5UJH9/nVW6iI6
Static task
static1
Behavioral task
behavioral1
Sample
de91a7fe31ed66c3e047fb1ea1269ec8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de91a7fe31ed66c3e047fb1ea1269ec8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
de91a7fe31ed66c3e047fb1ea1269ec8_JaffaCakes118
-
Size
1.3MB
-
MD5
de91a7fe31ed66c3e047fb1ea1269ec8
-
SHA1
d46c278786e2be435330fddc3d6ba1e8301cd3af
-
SHA256
a1ef37444b6e1b8a30cdeed40de0a6d7c86f750a4f2355c69a5a6849e82d772d
-
SHA512
703cf07914ff5155ccc4460e78028a89ddf97a492e2c60c6dba25c066faef522716027df38c0a0f783997f10c1079ac0e094e19a399a25d36a26a4a3e555b1bf
-
SSDEEP
24576:9rzMyPt4PdiGr/wf66m2tov+YtgVq2TiQULeMHYM/nV4hV6P0BOeMT6FJy7:9rzMtLr/wf664HtW/5UJH9/nVW6iI6
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-