General
-
Target
ee870db7a7334e2e1280503f3d512286_JaffaCakes118
-
Size
240KB
-
Sample
240920-15v4ca1cmb
-
MD5
ee870db7a7334e2e1280503f3d512286
-
SHA1
70fd99ea3e5407f87da359b07a6925357398a7ed
-
SHA256
e3748451b8af1e20ab3a0f8c5bd623ae345c92752e0109ea03e7d144befb1af6
-
SHA512
447ecc58cc3143d217eeb16401e9e001c6e4cd69bf0e62fcb7fce67c4c34409df204ffdb3fff5932f09ed663373c4045197fbdc7162465b9a80528596a7db3f2
-
SSDEEP
6144:+9iJFPHkDQxd9hr1bERAd/V5cR5RLvONoulGCM8A4ss:ci77L9ha21VqR5FvpulGlH4x
Behavioral task
behavioral1
Sample
Picture51.JPG_www.facebook.exe
Resource
win7-20240903-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
Picture51.JPG_www.facebook.com
-
Size
247KB
-
MD5
9ab9b29ed9665f438fd932b48125c0ce
-
SHA1
b18cc46c6adfa4f31e8757eb3893ec2defa025c0
-
SHA256
70e0d40ed37dc9f6d6034443f384569e277f0aa08355096e203b8c5da61ee36a
-
SHA512
3c4a2b0b41f083f8ad873b0c09e1a358cc9c0d61a74b1816bc774d51c7d79fc81b7e0faa41c84024bb55648ae9f103e2886f4faeacbc1f6a10d3c5ee15abd2d7
-
SSDEEP
6144:kpOWBNDeyzuJBeuqc593Kb6UMuxbPPPzgnPbOB1emoxzU53:svBTKefc59ouSbPzgPbO7Zol43
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-