General
-
Target
e8bb7b17da6ad2e6c616b77e6c79f9a0_JaffaCakes118
-
Size
197KB
-
Sample
240918-knkchsserq
-
MD5
e8bb7b17da6ad2e6c616b77e6c79f9a0
-
SHA1
08e833c27ca1895189ff3bdbf401734fb15e8d3e
-
SHA256
25cf3cc4b9248635cd4237925d69acab1b6851cc08ed081cd07020da8176689d
-
SHA512
011c7a804b10d80720af07d378e8f38cc2da7d3dc4e2baec2e8658b523a393c49b5ec3ff15b563db14ce15c121fa84f3aebb7c0f4402c327c9dcbbebaca8ba53
-
SSDEEP
3072:yL+hb026y9cJ9O/y7Ux3Y0fnZEljfXcP9I1cMZsUwOOHNvxIE:ylnUBYAulS61rZwOOfv
Behavioral task
behavioral1
Sample
e8bb7b17da6ad2e6c616b77e6c79f9a0_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
e8bb7b17da6ad2e6c616b77e6c79f9a0_JaffaCakes118
-
Size
197KB
-
MD5
e8bb7b17da6ad2e6c616b77e6c79f9a0
-
SHA1
08e833c27ca1895189ff3bdbf401734fb15e8d3e
-
SHA256
25cf3cc4b9248635cd4237925d69acab1b6851cc08ed081cd07020da8176689d
-
SHA512
011c7a804b10d80720af07d378e8f38cc2da7d3dc4e2baec2e8658b523a393c49b5ec3ff15b563db14ce15c121fa84f3aebb7c0f4402c327c9dcbbebaca8ba53
-
SSDEEP
3072:yL+hb026y9cJ9O/y7Ux3Y0fnZEljfXcP9I1cMZsUwOOHNvxIE:ylnUBYAulS61rZwOOfv
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-