General
-
Target
dec4216130e239a42f0269214a19eb2c_JaffaCakes118
-
Size
247KB
-
Sample
240913-yadvgavflb
-
MD5
dec4216130e239a42f0269214a19eb2c
-
SHA1
95ddfca6203a5bb939e94cad2f9d69a3a2c50de5
-
SHA256
8d515c1ed35ec2cbe416f9b7e3d8e8146ddb4f2361981a6e50aae32d8c2141ed
-
SHA512
5b04d58b6d88302cf2bc41acb8b2b565829da2e0e11a4a45ba617dbafc5a76152fc84af6fc8e7daf78b6fde8c4d409c37c422bd48d2302f7f0c5e8443fba1a17
-
SSDEEP
6144:EfE2i2j97gI2HDFZdbLvnxVKvYWef16STg:8E2phgI2jhbjPKv4QSTg
Behavioral task
behavioral1
Sample
dec4216130e239a42f0269214a19eb2c_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
dec4216130e239a42f0269214a19eb2c_JaffaCakes118
-
Size
247KB
-
MD5
dec4216130e239a42f0269214a19eb2c
-
SHA1
95ddfca6203a5bb939e94cad2f9d69a3a2c50de5
-
SHA256
8d515c1ed35ec2cbe416f9b7e3d8e8146ddb4f2361981a6e50aae32d8c2141ed
-
SHA512
5b04d58b6d88302cf2bc41acb8b2b565829da2e0e11a4a45ba617dbafc5a76152fc84af6fc8e7daf78b6fde8c4d409c37c422bd48d2302f7f0c5e8443fba1a17
-
SSDEEP
6144:EfE2i2j97gI2HDFZdbLvnxVKvYWef16STg:8E2phgI2jhbjPKv4QSTg
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-