General
-
Target
f45ba1d46debf5df8ffd9fb3639f4daf_JaffaCakes118
-
Size
232KB
-
Sample
240924-x8vp7s1dmp
-
MD5
f45ba1d46debf5df8ffd9fb3639f4daf
-
SHA1
4f26613249f597c535039e6f815d318f96ab29ef
-
SHA256
34cb613dc986a0c9f64bd35f761268e462768545d1a769fb88e620c2ba5a8de6
-
SHA512
9a9e8d4709c891b6eaf3d9fb69623bb28d96b4e34488b104b5d68161db80921dcf1bc4cdee2c9a73581a254692301ab675e977a895d87c1225806dcbdd4d78ac
-
SSDEEP
6144:GkbpuZ9khCYmZ0bDyGj9EylVv9wtGaVCo7Ksvm:PbYZ9ok0ffjiyv92d
Behavioral task
behavioral1
Sample
f45ba1d46debf5df8ffd9fb3639f4daf_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
f45ba1d46debf5df8ffd9fb3639f4daf_JaffaCakes118
-
Size
232KB
-
MD5
f45ba1d46debf5df8ffd9fb3639f4daf
-
SHA1
4f26613249f597c535039e6f815d318f96ab29ef
-
SHA256
34cb613dc986a0c9f64bd35f761268e462768545d1a769fb88e620c2ba5a8de6
-
SHA512
9a9e8d4709c891b6eaf3d9fb69623bb28d96b4e34488b104b5d68161db80921dcf1bc4cdee2c9a73581a254692301ab675e977a895d87c1225806dcbdd4d78ac
-
SSDEEP
6144:GkbpuZ9khCYmZ0bDyGj9EylVv9wtGaVCo7Ksvm:PbYZ9ok0ffjiyv92d
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-