General
-
Target
f4eee5f982f2482fbb3f8761404805f1_JaffaCakes118
-
Size
8KB
-
Sample
240925-chhbzaycmk
-
MD5
f4eee5f982f2482fbb3f8761404805f1
-
SHA1
7d8241337adba17d4b0577aa0843112c769bf942
-
SHA256
3fc24b8be6c1aeafd1d4be0aa1d26fe5d51bdb6308f5157b894a13c255d31e0e
-
SHA512
b69dda8ac7130dea6dbeb3c902af003de27f416c1424cddc52125367b216d03153ea53ce643a428d6f97980f9421887a936cddcae0f10bb47d05971b0eaf8ea8
-
SSDEEP
48:i7uD6XmotviCNIA734mkhthkYkJggydFpgH2SD9CTolgJehMSO:4WIgA73xJgXd3gHZ5Golg
Behavioral task
behavioral1
Sample
f4eee5f982f2482fbb3f8761404805f1_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4eee5f982f2482fbb3f8761404805f1_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
metasploit_stager
149.248.6.193:2011
Targets
-
-
Target
f4eee5f982f2482fbb3f8761404805f1_JaffaCakes118
-
Size
8KB
-
MD5
f4eee5f982f2482fbb3f8761404805f1
-
SHA1
7d8241337adba17d4b0577aa0843112c769bf942
-
SHA256
3fc24b8be6c1aeafd1d4be0aa1d26fe5d51bdb6308f5157b894a13c255d31e0e
-
SHA512
b69dda8ac7130dea6dbeb3c902af003de27f416c1424cddc52125367b216d03153ea53ce643a428d6f97980f9421887a936cddcae0f10bb47d05971b0eaf8ea8
-
SSDEEP
48:i7uD6XmotviCNIA734mkhthkYkJggydFpgH2SD9CTolgJehMSO:4WIgA73xJgXd3gHZ5Golg
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Blocklisted process makes network request
-
Suspicious use of SetThreadContext
-