General
-
Target
f8cbc9c7362ae92b353ddbe6a1afeff7_JaffaCakes118
-
Size
14KB
-
Sample
240926-t9mt7sxeql
-
MD5
f8cbc9c7362ae92b353ddbe6a1afeff7
-
SHA1
36c568cdd3bb7d921c0e6745baed277baeffcb09
-
SHA256
a56701d9145b0930033efe31226d063036d6245e0429b7d7c47ea74173132b6d
-
SHA512
4b6e675836dadc6af0b896801fb61ae5cf672e53dd1eaa132ceab86010b658bb248a68a295451efa69a11c0901b510a82a0a292f2c8d5dfc890ff3a4aa79e8ce
-
SSDEEP
192:/Z+Lp9zv+EUXPnzOU67Qp7VX82P8C6YFFdjOKirCbI+FUkiDa9VXAYz9KbL:/ZMiEU/z0QZOO8kj5LFUzu3AE8
Static task
static1
Behavioral task
behavioral1
Sample
f8cbc9c7362ae92b353ddbe6a1afeff7_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f8cbc9c7362ae92b353ddbe6a1afeff7_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
windows/reverse_tcp
176.109.191.187:4444
Targets
-
-
Target
f8cbc9c7362ae92b353ddbe6a1afeff7_JaffaCakes118
-
Size
14KB
-
MD5
f8cbc9c7362ae92b353ddbe6a1afeff7
-
SHA1
36c568cdd3bb7d921c0e6745baed277baeffcb09
-
SHA256
a56701d9145b0930033efe31226d063036d6245e0429b7d7c47ea74173132b6d
-
SHA512
4b6e675836dadc6af0b896801fb61ae5cf672e53dd1eaa132ceab86010b658bb248a68a295451efa69a11c0901b510a82a0a292f2c8d5dfc890ff3a4aa79e8ce
-
SSDEEP
192:/Z+Lp9zv+EUXPnzOU67Qp7VX82P8C6YFFdjOKirCbI+FUkiDa9VXAYz9KbL:/ZMiEU/z0QZOO8kj5LFUzu3AE8
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Blocklisted process makes network request
-