General

  • Target

    e43c9fb9b3d382ad79fe48ee264cb3ec_JaffaCakes118

  • Size

    268KB

  • MD5

    e43c9fb9b3d382ad79fe48ee264cb3ec

  • SHA1

    4ff1ad9e56f0b81dda5f03c55d722a5deca0e89f

  • SHA256

    7517ab6e457ec4e27619c3652950c9d346394fe48c321f288ef5b7f712889bf0

  • SHA512

    1bf77202c7666d1825af20c2eee4c6f4c48eb795ec773a5900d22abfd353ffa4ac7f0c47e413beafea5bd5f1712c29f9d17df983d7e8751320e83ab842fdfa94

  • SSDEEP

    3072:ljh9N4a1j712h9Td2+1lxvTeZna8xUhUbT15k:ljdFKdoSxvixTxUA

Score
10/10

Malware Config

Extracted

Family

cobaltstrike

Botnet

0

Attributes
  • watermark

    0

Signatures

  • Cobalt Strike reflective loader 1 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • e43c9fb9b3d382ad79fe48ee264cb3ec_JaffaCakes118
    .dll windows:5 windows x86 arch:x86


    Headers

    Sections