General
-
Target
eb3044f2a5f2e8c23324dbf4f9e233f5_JaffaCakes118
-
Size
46KB
-
Sample
240919-m1lgfsvcjf
-
MD5
eb3044f2a5f2e8c23324dbf4f9e233f5
-
SHA1
70e6e7c555f71514b7626102c97ca9b10bb16cfe
-
SHA256
d7b4ace36fb27949da38d4fc0d3a16718d71f02111455b5311303ed9b9836c55
-
SHA512
629eb7f4f0ba079ffcdf97b453017190186615364e94c011a1b8a98ed1ef6b2cf3f8e9b4e859434e33dface211b5705f705e4afdde77dbe9be5da404969ff520
-
SSDEEP
768:I/Ek3BUVumvBZM9+3gZu+/+LUBsDnETTVBNg0uMPZYscRr2q3HQ:a32dBZM9+GWUMn0hB0bRrH3
Static task
static1
Behavioral task
behavioral1
Sample
eb3044f2a5f2e8c23324dbf4f9e233f5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb3044f2a5f2e8c23324dbf4f9e233f5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
eb3044f2a5f2e8c23324dbf4f9e233f5_JaffaCakes118
-
Size
46KB
-
MD5
eb3044f2a5f2e8c23324dbf4f9e233f5
-
SHA1
70e6e7c555f71514b7626102c97ca9b10bb16cfe
-
SHA256
d7b4ace36fb27949da38d4fc0d3a16718d71f02111455b5311303ed9b9836c55
-
SHA512
629eb7f4f0ba079ffcdf97b453017190186615364e94c011a1b8a98ed1ef6b2cf3f8e9b4e859434e33dface211b5705f705e4afdde77dbe9be5da404969ff520
-
SSDEEP
768:I/Ek3BUVumvBZM9+3gZu+/+LUBsDnETTVBNg0uMPZYscRr2q3HQ:a32dBZM9+GWUMn0hB0bRrH3
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Adds Run key to start application
-