General
-
Target
9c0cd26e9189f14df0957eac7de3c833_JaffaCakes118
-
Size
105KB
-
Sample
241125-rp8j3a1kc1
-
MD5
9c0cd26e9189f14df0957eac7de3c833
-
SHA1
35190545d44435d7b57fd83b665c9524a62b44e8
-
SHA256
ef7f72c71904e6c57e437fccd8c67711e754c4719be00df4a68ea300df38d2de
-
SHA512
92e9cd709f64fad61125ad81e9b56a80f1bc630fbb2dbae012b9e7c188c83ea4fd44fdd4d200e867326377fe60a6f376e29003b2f088343cd57d704cbad0a36c
-
SSDEEP
1536:uhG/WZUDS1ZcMzuVqzigo/mb34pQQbrCuWx2Cy5zCMxfWZr:E8SIMzuuDbISGSD4tdWt
Static task
static1
Behavioral task
behavioral1
Sample
9c0cd26e9189f14df0957eac7de3c833_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9c0cd26e9189f14df0957eac7de3c833_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
9c0cd26e9189f14df0957eac7de3c833_JaffaCakes118
-
Size
105KB
-
MD5
9c0cd26e9189f14df0957eac7de3c833
-
SHA1
35190545d44435d7b57fd83b665c9524a62b44e8
-
SHA256
ef7f72c71904e6c57e437fccd8c67711e754c4719be00df4a68ea300df38d2de
-
SHA512
92e9cd709f64fad61125ad81e9b56a80f1bc630fbb2dbae012b9e7c188c83ea4fd44fdd4d200e867326377fe60a6f376e29003b2f088343cd57d704cbad0a36c
-
SSDEEP
1536:uhG/WZUDS1ZcMzuVqzigo/mb34pQQbrCuWx2Cy5zCMxfWZr:E8SIMzuuDbISGSD4tdWt
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Suspicious use of SetThreadContext
-