General
-
Target
f59e1979b673348cafd472b0470d595d_JaffaCakes118
-
Size
7KB
-
Sample
240925-kj2e8sydpb
-
MD5
f59e1979b673348cafd472b0470d595d
-
SHA1
a8c54ae7e32a06dd58ed8926d34a8a48ef03da11
-
SHA256
47a436ff52c0b1d37f951a7e5ca185d136bacf7043e5c581c9d2bd94ff843969
-
SHA512
1032b1844590b37e0015dccd067e95c7065923daf52e72c56c66bfd2e2c2ce81cd0cb0af8703ed679f2af5921df3f6c8a26be82f9df8e9aabe5164ed6176e868
-
SSDEEP
96:PHWaQTNCWRcX4r06S9IdHt5//FkUhP68J:PkCWK99IdHttOYS8J
Static task
static1
Behavioral task
behavioral1
Sample
f59e1979b673348cafd472b0470d595d_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f59e1979b673348cafd472b0470d595d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Targets
-
-
Target
f59e1979b673348cafd472b0470d595d_JaffaCakes118
-
Size
7KB
-
MD5
f59e1979b673348cafd472b0470d595d
-
SHA1
a8c54ae7e32a06dd58ed8926d34a8a48ef03da11
-
SHA256
47a436ff52c0b1d37f951a7e5ca185d136bacf7043e5c581c9d2bd94ff843969
-
SHA512
1032b1844590b37e0015dccd067e95c7065923daf52e72c56c66bfd2e2c2ce81cd0cb0af8703ed679f2af5921df3f6c8a26be82f9df8e9aabe5164ed6176e868
-
SSDEEP
96:PHWaQTNCWRcX4r06S9IdHt5//FkUhP68J:PkCWK99IdHttOYS8J
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Suspicious use of SetThreadContext
-