General
-
Target
e435b6f60ed68fe29ad76ba055220264_JaffaCakes118
-
Size
600KB
-
Sample
240916-hfhslstcnd
-
MD5
e435b6f60ed68fe29ad76ba055220264
-
SHA1
b9717d62e82e0f85a94672fd033e63ab876a7e61
-
SHA256
e626e340cf2cdd3e55b21b122056d3f3ef880bcffcef4abc0659ff48d3eb3f4d
-
SHA512
571ef5cc5d2c3a017ccfcbb52892b4c7946b6df2161dd3f24408bb8b8d55a9a91b6c68a1377f884cf28b71d21fe7aa637b361deda98a011cfa0e1c4f55bf237b
-
SSDEEP
12288:OtGXSmp9GRnlPQk04nQGWPv9p0Ijqfh3CfjRhNXXUtGSvCEafw:H+IkTQVnf0eq5hGS6Eyw
Behavioral task
behavioral1
Sample
e435b6f60ed68fe29ad76ba055220264_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e435b6f60ed68fe29ad76ba055220264_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
e435b6f60ed68fe29ad76ba055220264_JaffaCakes118
-
Size
600KB
-
MD5
e435b6f60ed68fe29ad76ba055220264
-
SHA1
b9717d62e82e0f85a94672fd033e63ab876a7e61
-
SHA256
e626e340cf2cdd3e55b21b122056d3f3ef880bcffcef4abc0659ff48d3eb3f4d
-
SHA512
571ef5cc5d2c3a017ccfcbb52892b4c7946b6df2161dd3f24408bb8b8d55a9a91b6c68a1377f884cf28b71d21fe7aa637b361deda98a011cfa0e1c4f55bf237b
-
SSDEEP
12288:OtGXSmp9GRnlPQk04nQGWPv9p0Ijqfh3CfjRhNXXUtGSvCEafw:H+IkTQVnf0eq5hGS6Eyw
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-