General
-
Target
9e39f7f2dddd304ae0e867930906551b_JaffaCakes118
-
Size
149KB
-
Sample
241125-191jmawmhp
-
MD5
9e39f7f2dddd304ae0e867930906551b
-
SHA1
c150010629055361b075f084d2e0a8438fc81988
-
SHA256
dd8294a2363819300a2c1c1b118978a8fae38f9ba9a8d0d416c80d7fe6f8d3cf
-
SHA512
4bedda82b54afb8a05ff3fb586852b70954f8ebb2df8fac599fdd1773a68d99c8d6ce78662e2a0e2e9ecb5e3548cdf6d199b9374ad8effed16838a5da4f957bb
-
SSDEEP
3072:1UhLHnFiOT6FhBLPvFU3dfH/JA7nn4ygrmqpjyg86Bojd:y7AdzBLPv0ffJYn/g6qNylBd
Static task
static1
Behavioral task
behavioral1
Sample
9e39f7f2dddd304ae0e867930906551b_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
9e39f7f2dddd304ae0e867930906551b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
9e39f7f2dddd304ae0e867930906551b_JaffaCakes118
-
Size
149KB
-
MD5
9e39f7f2dddd304ae0e867930906551b
-
SHA1
c150010629055361b075f084d2e0a8438fc81988
-
SHA256
dd8294a2363819300a2c1c1b118978a8fae38f9ba9a8d0d416c80d7fe6f8d3cf
-
SHA512
4bedda82b54afb8a05ff3fb586852b70954f8ebb2df8fac599fdd1773a68d99c8d6ce78662e2a0e2e9ecb5e3548cdf6d199b9374ad8effed16838a5da4f957bb
-
SSDEEP
3072:1UhLHnFiOT6FhBLPvFU3dfH/JA7nn4ygrmqpjyg86Bojd:y7AdzBLPv0ffJYn/g6qNylBd
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Suspicious use of SetThreadContext
-