General
-
Target
e824a73d88b9765985521ab74290a3b9_JaffaCakes118
-
Size
48KB
-
Sample
240918-ct3gaaxfqe
-
MD5
e824a73d88b9765985521ab74290a3b9
-
SHA1
342f0a37383772bb20eccaea65052afb1ccfea79
-
SHA256
b7b961f0673317cae29397cb520b1ed6bb3d152586b906fca98c0d309a5c24b4
-
SHA512
6cd932d3f637faeeead687f06e794d8c5417cebf5bb8ff128e3ca7513ed2fbd861bc56a80f5d4a5d340b7baa8c63539a384d5f5c5a8096377fb4a3e8a3497e2c
-
SSDEEP
768:Xt8aSHlCO0Ffbsfd0o/IZmtsQF+hYVhiBqrFx0oaaFa5DO42k9nK6FdM3SLBp:XyaNth2gstsqCza4pUqK6eYBp
Static task
static1
Behavioral task
behavioral1
Sample
e824a73d88b9765985521ab74290a3b9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e824a73d88b9765985521ab74290a3b9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
e824a73d88b9765985521ab74290a3b9_JaffaCakes118
-
Size
48KB
-
MD5
e824a73d88b9765985521ab74290a3b9
-
SHA1
342f0a37383772bb20eccaea65052afb1ccfea79
-
SHA256
b7b961f0673317cae29397cb520b1ed6bb3d152586b906fca98c0d309a5c24b4
-
SHA512
6cd932d3f637faeeead687f06e794d8c5417cebf5bb8ff128e3ca7513ed2fbd861bc56a80f5d4a5d340b7baa8c63539a384d5f5c5a8096377fb4a3e8a3497e2c
-
SSDEEP
768:Xt8aSHlCO0Ffbsfd0o/IZmtsQF+hYVhiBqrFx0oaaFa5DO42k9nK6FdM3SLBp:XyaNth2gstsqCza4pUqK6eYBp
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Adds Run key to start application
-