General
-
Target
ef0adc381b8f91ba4d15f1974d1ad6d6_JaffaCakes118
-
Size
509KB
-
Sample
240921-erhefavamf
-
MD5
ef0adc381b8f91ba4d15f1974d1ad6d6
-
SHA1
1788493893e381e7ce524bd1508ff17b832c3050
-
SHA256
8a9cc40e3fe71fbb57dbb77c88b321a98ff1e8a9187214da6de1d88a22d3c6d5
-
SHA512
310a7a628d0144b1eb957fe94aa483f5cb7f32be05b758c6bdd555a1de09587783b646fbeeba4ef40545a5403181c253fa2da3d5aa37f9f74f9d6d4e65ba01da
-
SSDEEP
6144:+5SkUafGDETiAT/KZUxZ0nnHCu9q0ubDWHACSlDJ:FoOAv/sUuni6ADWHEdJ
Behavioral task
behavioral1
Sample
ef0adc381b8f91ba4d15f1974d1ad6d6_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
ef0adc381b8f91ba4d15f1974d1ad6d6_JaffaCakes118
-
Size
509KB
-
MD5
ef0adc381b8f91ba4d15f1974d1ad6d6
-
SHA1
1788493893e381e7ce524bd1508ff17b832c3050
-
SHA256
8a9cc40e3fe71fbb57dbb77c88b321a98ff1e8a9187214da6de1d88a22d3c6d5
-
SHA512
310a7a628d0144b1eb957fe94aa483f5cb7f32be05b758c6bdd555a1de09587783b646fbeeba4ef40545a5403181c253fa2da3d5aa37f9f74f9d6d4e65ba01da
-
SSDEEP
6144:+5SkUafGDETiAT/KZUxZ0nnHCu9q0ubDWHACSlDJ:FoOAv/sUuni6ADWHEdJ
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-